Suggested Topics within your search.
Suggested Topics within your search.
- Health 8
- Constitutional court 7
- Court of Appeal 6
- Supreme court 6
- Judgement and orders 5
- Law reports, digests, etc 5
- Physical fitness 5
- Research 5
- methods 5
- Consumers 4
- Conversation analysis 4
- High court 4
- Judgements and orders 4
- Court of appeal 3
- Economic aspects 3
- History and criticism 3
- Mathematics 3
- Agriculture 2
- Anesthesia 2
- Anesthetics 2
- Biochemistry 2
- Chemistry 2
- Chemistry, Clinical 2
- Commercial law 2
- Court Bulletin 2
- Drug Dosage Calculations 2
- English language 2
- French language 2
- Health and Fitness 2
- Information technology 2
-
12401
Prediction of Fatigue Life of a Continuous Bridge Girder Based on Vehicle Induced Stress History
Published 2003-01-01“…The linear damage accumulation theory is then applied to calculate cumulative damage index and fatigue life of the bridge. …”
Get full text
Article -
12402
On a Stochastic Approach to Extensions of the Susceptible-Infected-Susceptible (SIS) Model Applied to Malaria
Published 2024-01-01“…This work presents a stochastic model of malaria spread. We first calculated the basic reproduction number R0 of the models ShIhRhSh‐SvIv and ShLhIhRhSh‐SvLvIv in order to show that the malaria-free equilibrium is asymptotically stable; then, we used a finite Markov chain model to describe the interactions between the different compartments of the model SeLeIeReSe‐SaLaIaRaSa‐SvIv. …”
Get full text
Article -
12403
Pricing American Options by a Fourier Transform Multinomial Tree in a Conic Market
Published 2022-01-01“…Because the Lévy process has the analytic form characteristic function, this method is a promising method to calculate the prices of options in the Lévy conic market.…”
Get full text
Article -
12404
EXPERIMENTAL STUDY ON FRACTURE TOUGHNESS OF MULTILAYER WELD JOINT BASED ON MICROSTRUCTURE
Published 2015-01-01“…J-R fracture resistance curve was fit and critical Jc( 25)with pop-in behavior were calculated according to the different of brittle and ductile fracture phenomenon.The crack initiation parts of brittle and ductile fracture of multilayer welding specimens were analyzed respectively by scanning electron microscopy. …”
Get full text
Article -
12405
Multi-objective Optimal Design of RV-550E Reducer Cycloid Gear Profile Modification
Published 2018-01-01“…The contact force of the cycloidal gear tooth surface is calculated. A multiobjective optimization model with considering the meshing characteristics of the cycloidal gear and the contact force of the tooth surface is established. …”
Get full text
Article -
12406
Computational Study of the Effect of the Size-Dependent Dielectric Functions of Gold Nanomaterials on Optical Properties
Published 2024-01-01“…The real and imaginary parts of the dielectric function of bulk as a function of wavelength due to free electron contribution and the real and imaginary parts of the dielectric function of nanogold materials as a function of wavelength due to free electron and bond electron contribution are calculated. The real and imaginary parts of the dielectric function of bulk as a function of wavelength due to the free electron contribution graph and The real and imaginary parts of the dielectric function of nanogold materials as a function of wavelength due to free electron and bond electron contributions are plotted. …”
Get full text
Article -
12407
Joint Wear Prediction and Experiments Considering the Influences of Coating and Spherical Joint Clearances
Published 2025-01-01“…Some scholars have conducted relevant experiments with simple planar mechanisms, for example, which have proved the feasibility and applicability of the numerical dynamics calculation method and different contact force models to a certain extent. …”
Get full text
Article -
12408
Risk Evaluation of Urban Integrated Pipe Corridor Operation and Maintenance Based on Improved AHP-CIM Model
Published 2022-01-01“…Using a combination of qualitative and quantitative methods, the risk factors in the operation and maintenance process of the integrated urban pipe corridor were first identified and their weights determined, and then the CIM model was used to calculate the probability distribution of the levels of risk factors at each level of the hierarchical model, and finally the risk assessment set of the risk probability distribution of this integrated pipe corridor was obtained. …”
Get full text
Article -
12409
Probing entanglement dynamics and topological transitions on noisy intermediate-scale quantum computers
Published 2025-01-01“…We simulate quench dynamics of the Su-Schrieffer-Heeger (SSH) chain on IBM quantum computers, calculating the Rényi entanglement entropy, the twist order parameter, and the Berry phase. …”
Get full text
Article -
12410
Service Discovery and Selection Based on Dynamic QoS in the Internet of Things
Published 2021-01-01“…The algorithm uses position matrix coding to represent all execution paths and replanning information of the service combination. By calculating the Hamming distance of the service quality between individuals, the quality of the service portfolio is improved. …”
Get full text
Article -
12411
GEOMETRIC PARAMETERS DETERMINATION AND SIMULATION OF SMALL-SIZED RV REDUCER
Published 2022-01-01“…Finally, by comparing the theoretical calculation results with the simulation results, the maximum contact stress errors of the involute planetary gear and the cycloidal pin gear tooth surface are up to 5.77% and 11.03%, respectively, which verifies the correctness of the theoretical analysis and the rationality of the structural design, and provides theoretical support for the subsequent research on small-sized RV reducers.…”
Get full text
Article -
12412
Att anmäla våld
Published 1997-06-01“…The variance in reporting is often explained in terms of either individual rational calculations by individuals (theft: insurance companies require that one report the stolen goods to the Police), or by general norms in society encouraging or inhibiting reporting practices (sexual harassment, rape etc. are often exemplifying a changing moral code reflected in an increased practice of reporting). …”
Get full text
Article -
12413
Dynamic privacy measurement model and evaluation system for mobile edge crowdsensing
Published 2021-02-01“…To tackle the problems of users not having intuitive cognition of the dynamic privacy changes contained in their sensing data in mobile edge crowdsensing (MECS) and lack of personalized privacy risk warning values in the data uploading stage, a dynamic privacy measurement (DPM) model was proposed.A structured representation of data obtained by a user participating in a sensing task was introduced and was transformed it into a numerical matrix.Then privacy attribute preference and timeliness were presented to quantify the dynamic privacy changes of data.With this, personalized privacy thresholds of users based on the numerical matrix were reasonably calculated.Finally, differential privacy processing was performed on the numerical matrix, and a model evaluation system was designed for the proposed model.The simulation results show that the DPM model was effective and practical.According to the given example, a data utility of approximately 0.7 can be achieved, and the degree of privacy protection can be significantly improved as the noise level increases, adapting to the MECS of IoT.…”
Get full text
Article -
12414
Multidimensional Heterogeneous Medical Data Push in Intelligent Cloud Collaborative Management System
Published 2020-01-01“…First of all, the logical architecture of the multidimensional heterogeneous data push system was determined, and the data push function was designed; secondly, redundant data removal and noise reduction preprocessing were conducted against the push data, correlation rules were used to integrate multidimensional heterogeneous medical data, the weight of medical data was calculated, the heterogeneous data matrix was constructed, and the integrated medical data were weighted to eliminate multidimensional heterogeneous interference. …”
Get full text
Article -
12415
Modeling Cu(II) Binding to Peptides Using the Extensible Systematic Force Field
Published 2010-01-01“…To improve computational efficiency, distance geometry calculations were used to constrain all combinations of three histidine ligands to be within bonding distance of the copper and the best results were utilized as starting structures for the ESFF computations. …”
Get full text
Article -
12416
Heat Partition between the Friction Components in Multi-disc Clutch during Sliding
Published 2016-01-01“…Experimental results show that,the temperature field calculated with variable heat partition coefficient is very close to the measured temperatures. …”
Get full text
Article -
12417
Dopant Introduced Valley Polarization, Spin, and Valley Hall Conductivity in Doped Monolayer MoS2
Published 2018-01-01“…We found that dopant introduced magnetic exchange field breaks the time inversion symmetry and decouples the energetically degenerated valleys into nondegenerate. Moreover, the calculated result reveals that, at low temperature, in insulating regime, anomalous Hall conductivity in a single valley and the total valley Hall conductivity are quantized, whereas the total spin Hall conductivity vanishes identically. …”
Get full text
Article -
12418
Adaptor signature scheme based on ISRSAC digital signature algorithm
Published 2023-03-01“…The adapter signature scheme can provide good properties of atomic exchange in the block chain, and has been widely used in practice.A new adapter signature scheme was constructed based on a digital signature algorithm for improved security of RSA cryptosystem (ISRSAC).After proving that the proposed scheme satisfied the correctness of the pre-signature, unforgeability, adaptability of the pre-signature, extractability of the evidence and the security of the signature scheme, it was compared with the adapter signature scheme based on the SM2 digital signature algorithm, the Schnorr-based adapter signature scheme and the ECDSA-based adapter signature scheme.And these schemes were analyzed in terms of time overhead and main calculation amount.The analysis results show that the proposed scheme is similar to other schemes in terms of time overhead, but the proposed scheme expands the application scenarios of ISRSAC algorithm in the current environment, and through the combination of ISRSAC algorithm and adapter signature technology, the selection of adapter signature is more flexible and can have a wider range of applications.…”
Get full text
Article -
12419
Assessing and visualizing fragility of clinical results with binary outcomes in R using the fragility package.
Published 2022-01-01“…It is not straightforward for clinicians to calculate these measures and visualize the results. …”
Get full text
Article -
12420
Influence of Key Parameter on Contact and Lubrication Performance of the Roller Enveloping Internal Engagement Worm Gear Transmission
Published 2019-03-01“…Then the influence of the key parameters on the lubrication and contact performance of worm drive are analyzed by the numerical calculation method. These key parameters include the center distance,the transmission ratio,roller radius and the worm-wheel rotational deflection. …”
Get full text
Article