Showing 19,761 - 19,780 results of 38,494 for search 'Flowey~', query time: 2.51s Refine Results
  1. 19761

    Some New Characterizations of Trivial Ricci–Bourguignon Solitons by Hana Al-Sodais, Nasser Bin Turki, Sharief Deshmukh, Bang-Yen Chen, Hemangi Madhusudan Shah

    Published 2025-01-01
    “…A Ricci–Bourguignon soliton is a self-similar solution to the Ricci–Bourguignon flow equation, and a Ricci–Bourguignon soliton is called trivial if its potential field is zero or killing. …”
    Get full text
    Article
  2. 19762

    Mass public opinion: algorithmic colonisation and synthetisation of the public sphere by Carlos Saura García, Patrici Calvo

    Published 2024-12-01
    “…This is utilised by government organisations, big tech corporations and economic powers to threaten the integrity of democracy via the alteration of the processes of rationalisation and meaning-making, as well as the communication flows involved, which leads to the appearance of social pathologies, anomalies and distortions in the digital public sphere. …”
    Get full text
    Article
  3. 19763

    Cookie based online tracing method for cyberlockers resource by Hai-lun LIN, Yan LI, Wei-ping WANG, Yin-liang YUE, Zheng LIN

    Published 2016-12-01
    “…In light of the non-negligible fraction accounted by the traffic flows originating from cyberlocks, it is necessary to trace them for net-work security. …”
    Get full text
    Article
  4. 19764

    An Entropy Based Anomaly Traffic Detection Approach in SDN by Mingxin Wang, Huachun Zhou, Jia Chen, Hongke Zhang

    Published 2015-09-01
    “…As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. …”
    Get full text
    Article
  5. 19765

    Growth of a Renormalized Operator as a Probe of Chaos by Xing Huang, Binchao Zhang

    Published 2022-01-01
    “…We propose that the size of an operator evolved under holographic renormalization group flow shall grow linearly with the scale and interpret this behavior as a manifestation of the saturation of the chaos bound. …”
    Get full text
    Article
  6. 19766

    Pseudo-analytic finite partition approach to temperature distribution problem in Human limbs by V. P. Saxena, J. S. Bindra

    Published 1989-01-01
    “…The theoretical model incorporates the effect of blood mass flow and metabolic heat generation. The region is divided into annular sub-regions and Ritz variational finite element method is applied along the radial direction, while for the angular direction, Fourier Series has been used due to uniformity in each annular part.…”
    Get full text
    Article
  7. 19767

    Quadratic Killing tensors on symmetric spaces which are not generated by Killing vector fields by Matveev, Vladimir S., Nikolayevsky, Yuri

    Published 2024-11-01
    “…Every Killing tensor field on the space of constant curvature and on the complex projective space can be decomposed into the sum of symmetric tensor products of Killing vector fields (equivalently, every polynomial in velocities integral of the geodesic flow is a polynomial in the linear integrals). This fact led to the natural question on whether this property is shared by Killing tensor fields on all Riemannian symmetric spaces. …”
    Get full text
    Article
  8. 19768

    Application of a Stress-Fractional Model for Capturing the Stress-Strain Behavior of Granular Soils by Wei Lu, Jiangong Yang, Jinan Wang

    Published 2021-01-01
    “…To capture the plastic loading and flow behaviors, a subloading surface with the fractional stress gradient is used. …”
    Get full text
    Article
  9. 19769

    Analyzing the Diverging Diamond Interchange Using Discrete Event Simulation by Michael Anderson, Bernard Schroer, Dietmar Moeller

    Published 2012-01-01
    “…The diverging diamond interchange (DDI) can improve traffic flow by limiting the number of phases in the traffic signals and improve safety by eliminating left turns. …”
    Get full text
    Article
  10. 19770

    Cord Entanglement in Monoamniotic Twin Pregnancy: A Case Report and Review of the Literature by Ayşe Figen Türkçapar, Berna Seçkin, Ayla Sargın Oruç

    Published 2013-08-01
    “…Cord entanglement can potentially compromise the cord blood flow and cause fetal demise. There is still no consensus on the antenatal management and timing of delivery of these rarely encountered cases. …”
    Get full text
    Article
  11. 19771

    A Validated RP – HPLC Method for Simultaneous Estimation of Cefixime and Cloxacillin in Tablets by G. Rathinavel, P. B. Mukherjee, J. Valarmathy, L. Samueljoshua, M. Ganesh, T. Sivakumar, T. Saravanan

    Published 2008-01-01
    “…The process was carried out on C18 column (5 μm, 25 cm × 4.6 mm, i.d) using phosphate buffer (pH 5.0), acetonitrile and methanol in the ratio 80:17:3 respectively as a mobile phase at a flow rate of 2mL/min. Wavelength was fixed at 225 nm. …”
    Get full text
    Article
  12. 19772

    Réseaux de chercheurs en Méditerranée. Contraintes institutionnelles et autonomie scientifique by François Siino

    Published 2009-11-01
    “…Between Northern and Southern shores of the Mediterranean, networks have superseded traditional forms of cooperation based on flows of people. One of the largest of these networks, the Ramses Network of Excellence in human and social sciences was created in 2006 with European funding support. …”
    Get full text
    Article
  13. 19773

    A Multicoefficient Slip-Corrected Reynolds Equation for Micro-Thin Film Gas Lubrication by Eddie Yin-Kwee Ng, Ningyu Liu

    Published 2005-01-01
    “…A modified Reynolds equation is also derived based on the new slip-flow model. The multicoefficient slip model and its slip-corrected Reynolds equation are suitable to a wide Knudsen range from slip to transition regime. …”
    Get full text
    Article
  14. 19774

    Formation of mechanisms for sustainable development of industrial enterprises on the example of the power industry by V. V. Lebedev

    Published 2023-07-01
    “…It also takes measures to ensure energy security and maintains stable flows of finance and capital with stability of investment activity. …”
    Get full text
    Article
  15. 19775

    Monitoring road safety in an information-wired environment: the case of Piedmont by Sylvie Occelli

    Published 2012-10-01
    “…They make it possible to build new Socio-Technical Systems (STS) where the knowledge flow initiated by the interactions of ICT-enabled nodes has a crucial role. …”
    Get full text
    Article
  16. 19776

    DESIGN AND RESEARCH OF INTELLIGENT CONTROL SYSTEM FOR BELT CONVEYOR by WANG JiDong, SUN JianYan, HU MeiLing

    Published 2019-01-01
    “…The main technical points of the system are introduced from the aspects of overall solution, hardware selection, software design and control flow.…”
    Get full text
    Article
  17. 19777

    Asymptotic and numerical solutions for diffusion models for compounded risk reserves with dividend payments by S. Shao, C. L. Chang

    Published 2004-01-01
    “…Based on the behavior of the total income flow, asymptotic and numerical methods are used to solve the special class of diffusion equations which govern the conditional ruin probability over finite time.…”
    Get full text
    Article
  18. 19778

    Advances in thyroid peroxidase (TPO) and thyroid stimulating hormone receptor (TSHR) biomarkers for autoimmune thyroid diseases by Aulanniam, Achmad Rudijanto, Andreas Budi Wijaya

    Published 2024-10-01
    “…Additionally, it discusses the development of lateral flow assay (LFA) kits developed by the authors, which show promise as rapid and reliable diagnostic tools for AITD. …”
    Get full text
    Article
  19. 19779

    Extensive Macular Atrophy with Pseudodrusen Imaged with OCT Angiography by Jaclyn L. Kovach

    Published 2018-01-01
    “…OCTA demonstrated marked absence of choriocapillaris flow. Extensive macular atrophy with pseudodrusen is a rare clinical entity and a new extreme phenotype of macular degenerations that could shed more light on the role of pseudodrusen and choriocapillaris compromise in the pathogenesis of AMD.…”
    Get full text
    Article
  20. 19780

    Research and Implication of Traffic Analyzing Technology in Mobile Packet Network Based on DPI Technology by Yanrong Zhang, Zhizhong Zhang, Mingzhi Jiang, Xiaoping Zheng

    Published 2014-04-01
    “…Then the service identification and statistics of mobile packet network were implemented by using the complementary advantages for DPI(deep packet inspection)and DFI(deep flow inspection)technology. According to the test of current network data, this scheme works well for xDR synthesizing and service identification, with high efficiency and accuracy. …”
    Get full text
    Article