Suggested Topics within your search.
Suggested Topics within your search.
- methods 5
- Abdomen 4
- Anatomy 4
- Chest 4
- Dissection 4
- Extremities (Anatomy) 4
- Human anatomy 4
- Tourism 4
- Anatomy, Regional 2
- Biochemistry 2
- Molecular biology 2
- 17 drug summaries 1
- 44.83 rheumatology, orthopedics 1
- Anatomy, Surgical and topographical 1
- Chemical engineering 1
- Company law 1
- Comparative method 1
- Cross-cultural studies 1
- Diagnosis, Differential 1
- Domestic relations 1
- English 1
- English language 1
- Ethnology 1
- Fluid mechanics 1
- Grammar 1
- Gynecology 1
- Horticultural crops 1
- Identification 1
- Interpretation and construction 1
- Law 1
-
19761
Some New Characterizations of Trivial Ricci–Bourguignon Solitons
Published 2025-01-01“…A Ricci–Bourguignon soliton is a self-similar solution to the Ricci–Bourguignon flow equation, and a Ricci–Bourguignon soliton is called trivial if its potential field is zero or killing. …”
Get full text
Article -
19762
Mass public opinion: algorithmic colonisation and synthetisation of the public sphere
Published 2024-12-01“…This is utilised by government organisations, big tech corporations and economic powers to threaten the integrity of democracy via the alteration of the processes of rationalisation and meaning-making, as well as the communication flows involved, which leads to the appearance of social pathologies, anomalies and distortions in the digital public sphere. …”
Get full text
Article -
19763
Cookie based online tracing method for cyberlockers resource
Published 2016-12-01“…In light of the non-negligible fraction accounted by the traffic flows originating from cyberlocks, it is necessary to trace them for net-work security. …”
Get full text
Article -
19764
An Entropy Based Anomaly Traffic Detection Approach in SDN
Published 2015-09-01“…As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. …”
Get full text
Article -
19765
Growth of a Renormalized Operator as a Probe of Chaos
Published 2022-01-01“…We propose that the size of an operator evolved under holographic renormalization group flow shall grow linearly with the scale and interpret this behavior as a manifestation of the saturation of the chaos bound. …”
Get full text
Article -
19766
Pseudo-analytic finite partition approach to temperature distribution problem in Human limbs
Published 1989-01-01“…The theoretical model incorporates the effect of blood mass flow and metabolic heat generation. The region is divided into annular sub-regions and Ritz variational finite element method is applied along the radial direction, while for the angular direction, Fourier Series has been used due to uniformity in each annular part.…”
Get full text
Article -
19767
Quadratic Killing tensors on symmetric spaces which are not generated by Killing vector fields
Published 2024-11-01“…Every Killing tensor field on the space of constant curvature and on the complex projective space can be decomposed into the sum of symmetric tensor products of Killing vector fields (equivalently, every polynomial in velocities integral of the geodesic flow is a polynomial in the linear integrals). This fact led to the natural question on whether this property is shared by Killing tensor fields on all Riemannian symmetric spaces. …”
Get full text
Article -
19768
Application of a Stress-Fractional Model for Capturing the Stress-Strain Behavior of Granular Soils
Published 2021-01-01“…To capture the plastic loading and flow behaviors, a subloading surface with the fractional stress gradient is used. …”
Get full text
Article -
19769
Analyzing the Diverging Diamond Interchange Using Discrete Event Simulation
Published 2012-01-01“…The diverging diamond interchange (DDI) can improve traffic flow by limiting the number of phases in the traffic signals and improve safety by eliminating left turns. …”
Get full text
Article -
19770
Cord Entanglement in Monoamniotic Twin Pregnancy: A Case Report and Review of the Literature
Published 2013-08-01“…Cord entanglement can potentially compromise the cord blood flow and cause fetal demise. There is still no consensus on the antenatal management and timing of delivery of these rarely encountered cases. …”
Get full text
Article -
19771
A Validated RP – HPLC Method for Simultaneous Estimation of Cefixime and Cloxacillin in Tablets
Published 2008-01-01“…The process was carried out on C18 column (5 μm, 25 cm × 4.6 mm, i.d) using phosphate buffer (pH 5.0), acetonitrile and methanol in the ratio 80:17:3 respectively as a mobile phase at a flow rate of 2mL/min. Wavelength was fixed at 225 nm. …”
Get full text
Article -
19772
Réseaux de chercheurs en Méditerranée. Contraintes institutionnelles et autonomie scientifique
Published 2009-11-01“…Between Northern and Southern shores of the Mediterranean, networks have superseded traditional forms of cooperation based on flows of people. One of the largest of these networks, the Ramses Network of Excellence in human and social sciences was created in 2006 with European funding support. …”
Get full text
Article -
19773
A Multicoefficient Slip-Corrected Reynolds Equation for Micro-Thin Film Gas Lubrication
Published 2005-01-01“…A modified Reynolds equation is also derived based on the new slip-flow model. The multicoefficient slip model and its slip-corrected Reynolds equation are suitable to a wide Knudsen range from slip to transition regime. …”
Get full text
Article -
19774
Formation of mechanisms for sustainable development of industrial enterprises on the example of the power industry
Published 2023-07-01“…It also takes measures to ensure energy security and maintains stable flows of finance and capital with stability of investment activity. …”
Get full text
Article -
19775
Monitoring road safety in an information-wired environment: the case of Piedmont
Published 2012-10-01“…They make it possible to build new Socio-Technical Systems (STS) where the knowledge flow initiated by the interactions of ICT-enabled nodes has a crucial role. …”
Get full text
Article -
19776
DESIGN AND RESEARCH OF INTELLIGENT CONTROL SYSTEM FOR BELT CONVEYOR
Published 2019-01-01“…The main technical points of the system are introduced from the aspects of overall solution, hardware selection, software design and control flow.…”
Get full text
Article -
19777
Asymptotic and numerical solutions for diffusion models for compounded risk reserves with dividend payments
Published 2004-01-01“…Based on the behavior of the total income flow, asymptotic and numerical methods are used to solve the special class of diffusion equations which govern the conditional ruin probability over finite time.…”
Get full text
Article -
19778
Advances in thyroid peroxidase (TPO) and thyroid stimulating hormone receptor (TSHR) biomarkers for autoimmune thyroid diseases
Published 2024-10-01“…Additionally, it discusses the development of lateral flow assay (LFA) kits developed by the authors, which show promise as rapid and reliable diagnostic tools for AITD. …”
Get full text
Article -
19779
Extensive Macular Atrophy with Pseudodrusen Imaged with OCT Angiography
Published 2018-01-01“…OCTA demonstrated marked absence of choriocapillaris flow. Extensive macular atrophy with pseudodrusen is a rare clinical entity and a new extreme phenotype of macular degenerations that could shed more light on the role of pseudodrusen and choriocapillaris compromise in the pathogenesis of AMD.…”
Get full text
Article -
19780
Research and Implication of Traffic Analyzing Technology in Mobile Packet Network Based on DPI Technology
Published 2014-04-01“…Then the service identification and statistics of mobile packet network were implemented by using the complementary advantages for DPI(deep packet inspection)and DFI(deep flow inspection)technology. According to the test of current network data, this scheme works well for xDR synthesizing and service identification, with high efficiency and accuracy. …”
Get full text
Article