Showing 12,401 - 12,420 results of 23,860 for search 'Palyul~', query time: 2.24s Refine Results
  1. 12401

    Prediction of Fatigue Life of a Continuous Bridge Girder Based on Vehicle Induced Stress History by V.G. Rao, S. Talukdar

    Published 2003-01-01
    “…The linear damage accumulation theory is then applied to calculate cumulative damage index and fatigue life of the bridge. …”
    Get full text
    Article
  2. 12402

    On a Stochastic Approach to Extensions of the Susceptible-Infected-Susceptible (SIS) Model Applied to Malaria by Abdoul Karim Drabo, Frédéric Bere, S. P. Clovis Nitiema

    Published 2024-01-01
    “…This work presents a stochastic model of malaria spread. We first calculated the basic reproduction number R0 of the models ShIhRhSh‐SvIv and ShLhIhRhSh‐SvLvIv in order to show that the malaria-free equilibrium is asymptotically stable; then, we used a finite Markov chain model to describe the interactions between the different compartments of the model SeLeIeReSe‐SaLaIaRaSa‐SvIv. …”
    Get full text
    Article
  3. 12403

    Pricing American Options by a Fourier Transform Multinomial Tree in a Conic Market by Weiwei Wang, Xiaoping Hu

    Published 2022-01-01
    “…Because the Lévy process has the analytic form characteristic function, this method is a promising method to calculate the prices of options in the Lévy conic market.…”
    Get full text
    Article
  4. 12404

    EXPERIMENTAL STUDY ON FRACTURE TOUGHNESS OF MULTILAYER WELD JOINT BASED ON MICROSTRUCTURE by WU HaiLi, JIA GuoQing, AN ChunXiang

    Published 2015-01-01
    “…J-R fracture resistance curve was fit and critical Jc( 25)with pop-in behavior were calculated according to the different of brittle and ductile fracture phenomenon.The crack initiation parts of brittle and ductile fracture of multilayer welding specimens were analyzed respectively by scanning electron microscopy. …”
    Get full text
    Article
  5. 12405

    Multi-objective Optimal Design of RV-550E Reducer Cycloid Gear Profile Modification by Wang Quan, Qin Zhengzheng, Zhao Daxing, Wang Jun, Chen Zhilong, Yan Zicheng

    Published 2018-01-01
    “…The contact force of the cycloidal gear tooth surface is calculated. A multiobjective optimization model with considering the meshing characteristics of the cycloidal gear and the contact force of the tooth surface is established. …”
    Get full text
    Article
  6. 12406

    Computational Study of the Effect of the Size-Dependent Dielectric Functions of Gold Nanomaterials on Optical Properties by Bawoke Mekuye, Rainer Höfer, Gedefaw Mebratie

    Published 2024-01-01
    “…The real and imaginary parts of the dielectric function of bulk as a function of wavelength due to free electron contribution and the real and imaginary parts of the dielectric function of nanogold materials as a function of wavelength due to free electron and bond electron contribution are calculated. The real and imaginary parts of the dielectric function of bulk as a function of wavelength due to the free electron contribution graph and The real and imaginary parts of the dielectric function of nanogold materials as a function of wavelength due to free electron and bond electron contributions are plotted. …”
    Get full text
    Article
  7. 12407

    Joint Wear Prediction and Experiments Considering the Influences of Coating and Spherical Joint Clearances by Qian Jing, Baolong Geng

    Published 2025-01-01
    “…Some scholars have conducted relevant experiments with simple planar mechanisms, for example, which have proved the feasibility and applicability of the numerical dynamics calculation method and different contact force models to a certain extent. …”
    Get full text
    Article
  8. 12408

    Risk Evaluation of Urban Integrated Pipe Corridor Operation and Maintenance Based on Improved AHP-CIM Model by Shuai Wang, Shaochuan Fu

    Published 2022-01-01
    “…Using a combination of qualitative and quantitative methods, the risk factors in the operation and maintenance process of the integrated urban pipe corridor were first identified and their weights determined, and then the CIM model was used to calculate the probability distribution of the levels of risk factors at each level of the hierarchical model, and finally the risk assessment set of the risk probability distribution of this integrated pipe corridor was obtained. …”
    Get full text
    Article
  9. 12409

    Probing entanglement dynamics and topological transitions on noisy intermediate-scale quantum computers by Huai-Chun Chang, Hsiu-Chuan Hsu, Yu-Cheng Lin

    Published 2025-01-01
    “…We simulate quench dynamics of the Su-Schrieffer-Heeger (SSH) chain on IBM quantum computers, calculating the Rényi entanglement entropy, the twist order parameter, and the Berry phase. …”
    Get full text
    Article
  10. 12410

    Service Discovery and Selection Based on Dynamic QoS in the Internet of Things by Naiheng Zhang

    Published 2021-01-01
    “…The algorithm uses position matrix coding to represent all execution paths and replanning information of the service combination. By calculating the Hamming distance of the service quality between individuals, the quality of the service portfolio is improved. …”
    Get full text
    Article
  11. 12411

    GEOMETRIC PARAMETERS DETERMINATION AND SIMULATION OF SMALL-SIZED RV REDUCER by WANG Jun, ZHANG HuiMin

    Published 2022-01-01
    “…Finally, by comparing the theoretical calculation results with the simulation results, the maximum contact stress errors of the involute planetary gear and the cycloidal pin gear tooth surface are up to 5.77% and 11.03%, respectively, which verifies the correctness of the theoretical analysis and the rationality of the structural design, and provides theoretical support for the subsequent research on small-sized RV reducers.…”
    Get full text
    Article
  12. 12412

    Att anmäla våld by Malin Åkerström

    Published 1997-06-01
    “…The variance in reporting is often explained in terms of either individual rational calculations by individuals (theft: insurance companies require that one report the stolen goods to the Police), or by general norms in society encouraging or inhibiting reporting practices (sexual harassment, rape etc. are often exemplifying a changing moral code reflected in an increased practice of reporting). …”
    Get full text
    Article
  13. 12413

    Dynamic privacy measurement model and evaluation system for mobile edge crowdsensing by Mingfeng ZHAO, Chen LEI, Yang ZHONG, Jinbo XIONG

    Published 2021-02-01
    “…To tackle the problems of users not having intuitive cognition of the dynamic privacy changes contained in their sensing data in mobile edge crowdsensing (MECS) and lack of personalized privacy risk warning values in the data uploading stage, a dynamic privacy measurement (DPM) model was proposed.A structured representation of data obtained by a user participating in a sensing task was introduced and was transformed it into a numerical matrix.Then privacy attribute preference and timeliness were presented to quantify the dynamic privacy changes of data.With this, personalized privacy thresholds of users based on the numerical matrix were reasonably calculated.Finally, differential privacy processing was performed on the numerical matrix, and a model evaluation system was designed for the proposed model.The simulation results show that the DPM model was effective and practical.According to the given example, a data utility of approximately 0.7 can be achieved, and the degree of privacy protection can be significantly improved as the noise level increases, adapting to the MECS of IoT.…”
    Get full text
    Article
  14. 12414

    Multidimensional Heterogeneous Medical Data Push in Intelligent Cloud Collaborative Management System by Gang Liu, Xiaofeng Li

    Published 2020-01-01
    “…First of all, the logical architecture of the multidimensional heterogeneous data push system was determined, and the data push function was designed; secondly, redundant data removal and noise reduction preprocessing were conducted against the push data, correlation rules were used to integrate multidimensional heterogeneous medical data, the weight of medical data was calculated, the heterogeneous data matrix was constructed, and the integrated medical data were weighted to eliminate multidimensional heterogeneous interference. …”
    Get full text
    Article
  15. 12415

    Modeling Cu(II) Binding to Peptides Using the Extensible Systematic Force Field by Faina Ryvkin, Frederick T. Greenaway

    Published 2010-01-01
    “…To improve computational efficiency, distance geometry calculations were used to constrain all combinations of three histidine ligands to be within bonding distance of the copper and the best results were utilized as starting structures for the ESFF computations. …”
    Get full text
    Article
  16. 12416

    Heat Partition between the Friction Components in Multi-disc Clutch during Sliding by Xiong Cenbo, Ma Biao, Li Heyan, Zhang Fenglian, Zhu Li’an

    Published 2016-01-01
    “…Experimental results show that,the temperature field calculated with variable heat partition coefficient is very close to the measured temperatures. …”
    Get full text
    Article
  17. 12417

    Dopant Introduced Valley Polarization, Spin, and Valley Hall Conductivity in Doped Monolayer MoS2 by Sintayehu Mekonnen, Pooran Singh

    Published 2018-01-01
    “…We found that dopant introduced magnetic exchange field breaks the time inversion symmetry and decouples the energetically degenerated valleys into nondegenerate. Moreover, the calculated result reveals that, at low temperature, in insulating regime, anomalous Hall conductivity in a single valley and the total valley Hall conductivity are quantized, whereas the total spin Hall conductivity vanishes identically. …”
    Get full text
    Article
  18. 12418

    Adaptor signature scheme based on ISRSAC digital signature algorithm by Yanshuo ZHANG, Ning LIU, Yuqi YUAN, Yatao YANG

    Published 2023-03-01
    “…The adapter signature scheme can provide good properties of atomic exchange in the block chain, and has been widely used in practice.A new adapter signature scheme was constructed based on a digital signature algorithm for improved security of RSA cryptosystem (ISRSAC).After proving that the proposed scheme satisfied the correctness of the pre-signature, unforgeability, adaptability of the pre-signature, extractability of the evidence and the security of the signature scheme, it was compared with the adapter signature scheme based on the SM2 digital signature algorithm, the Schnorr-based adapter signature scheme and the ECDSA-based adapter signature scheme.And these schemes were analyzed in terms of time overhead and main calculation amount.The analysis results show that the proposed scheme is similar to other schemes in terms of time overhead, but the proposed scheme expands the application scenarios of ISRSAC algorithm in the current environment, and through the combination of ISRSAC algorithm and adapter signature technology, the selection of adapter signature is more flexible and can have a wider range of applications.…”
    Get full text
    Article
  19. 12419

    Assessing and visualizing fragility of clinical results with binary outcomes in R using the fragility package. by Lifeng Lin, Haitao Chu

    Published 2022-01-01
    “…It is not straightforward for clinicians to calculate these measures and visualize the results. …”
    Get full text
    Article
  20. 12420

    Influence of Key Parameter on Contact and Lubrication Performance of the Roller Enveloping Internal Engagement Worm Gear Transmission by Yuanhong Song, Xingqiao Deng, Yuanyuan Jiang, Jinge Wang

    Published 2019-03-01
    “…Then the influence of the key parameters on the lubrication and contact performance of worm drive are analyzed by the numerical calculation method. These key parameters include the center distance,the transmission ratio,roller radius and the worm-wheel rotational deflection. …”
    Get full text
    Article