Showing 21 - 40 results of 99 for search 'Static Major', query time: 0.06s Refine Results
  1. 21

    Finite Element and Multibody Dynamics Analysis of a Ball Mill Glass Crusher by Jihad Rishmany, Rodrigue Imad

    Published 2023-01-01
    “…Recycling and sustainability constitute a major challenge to preserve human life quality and ensure a good standard of living for future generations. …”
    Get full text
    Article
  2. 22

    Small Surface Fatigue Crack Behaviors of Cr-Mo Steel AISI4137 by Seung-Hoon Nahm, Sang-Koo Jeon, Dong-Kyun Kim, Min-Soo Suh, Chang-Min Suh

    Published 2024-12-01
    “…In other words, this major crack grew and developed a major ridge in the internal direction, determining the lifespan of the test specimen.…”
    Get full text
    Article
  3. 23

    Experimental study on strength degradation and meso-structural characteristics of saturated sandstone under freeze-thaw cycles by Haotian XIE, Ying XU, Qiangqiang ZHENG, Meilu YU, Shoudong XIE, Chengjie LI

    Published 2024-12-01
    “…Freeze-thaw damage to rock masses on slopes constitutes a major hazard in open-pit mining operations, particularly in the cold regions of the western area. …”
    Get full text
    Article
  4. 24

    Intelligent On/Off Dynamic Link Management for On-Chip Networks by Andreas G. Savva, Theocharis Theocharides, Vassos Soteriou

    Published 2012-01-01
    “…Power consumption, however, is a major limitation in NoCs today, and researchers have been constantly working on reducing both dynamic and static power. …”
    Get full text
    Article
  5. 25

    Optimization Manufacture of Virus- and Tumor-Specific T Cells by Natalia Lapteva, Juan F. Vera

    Published 2011-01-01
    “…Although ex vivo expanded T cells are currently widely used in pre-clinical and clinical trials, the complexity of manufacture remains a major impediment for broader application. In this review we discuss current protocols for the ex vivo expansion of virus- and tumor-specific T cells and describe our experience in manufacture optimization using a gas-permeable static culture flask (G-Rex). …”
    Get full text
    Article
  6. 26

    Moving target defense against network eavesdropping attack using POF by Duohe MA, Qiong LI, Dongdai LIN

    Published 2018-02-01
    “…Eavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches.Since existing encryption or dynamic address methods could only confuse part of fields of network protocols,they couldn’t form a comprehensive protection.Therefore a moving target defense method by utilizing the protocol customization ability of protocol-oblivious forwarding (POF) was proposed,through private protocol packet randomization strategy and randomly drop deception-packets on dynamic paths strategy.It could greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process.Experiments and compare studies show its efficiency.…”
    Get full text
    Article
  7. 27

    Research progress of triangle counting in big data by Hongqiao JIN, Yihong DONG

    Published 2016-06-01
    “…Counting triangles in a graph is an important step to calculate the clustering coefficient and the transitivity ratio of the network,which is widely used in important role identification,spam detection,community discovery,biological detection etc.Counting triangles algorithm is mainly faced with two major problems of space-time consumption and accuracy.The representative algorithm of the counting triangles in the big graph was introduced.There existed two kinds of algorithms,which were exact counting algorithm and approximate counting algorithm.Exact counting algorithms were divided into internal memory algorithm,external memory algorithm and distributed algorithm.The space-time consumption or I/O consumption of exact counting algorithm was very large.Approximate counting algorithms were divided into auxiliary algorithm,static algorithm and streaming algorithm.In the end,the counting triangles algorithms were summarized.…”
    Get full text
    Article
  8. 28

    Low Dose X-Ray Sources and High Quantum Efficiency Sensors: The Next Challenge in Dental Digital Imaging? by Arnav R. Mistry, Daniel Uzbelger Feldman, Jie Yang, Eric Ryterski

    Published 2014-01-01
    “…Objective(s). The major challenge encountered to decrease the milliamperes (mA) level in X-ray imaging systems is the quantum noise phenomena. …”
    Get full text
    Article
  9. 29

    On the Shoulders of Giants: Incremental Influence Maximization in Evolving Social Networks by Xiaodong Liu, Xiangke Liao, Shanshan Li, Si Zheng, Bin Lin, Jingying Zhang, Lisong Shao, Chenlin Huang, Liquan Xiao

    Published 2017-01-01
    “…Previous studies mainly focus on designing efficient algorithms or heuristics on a static social network. As a matter of fact, real-world social networks keep evolving over time and a recalculation upon the changed network inevitably leads to a long running time. …”
    Get full text
    Article
  10. 30

    Novel Strategy to Improve the Performance of Localization in WSN by M. Vasim Babu, A. V. Ramprasad

    Published 2015-01-01
    “…In our model the discrete hidden Markov process plays a major role in analyzing the node location in heterogeneous media. …”
    Get full text
    Article
  11. 31

    The use of thermally expandable microcapsules for increasing the toughness and heal structural adhesives by Guillaume Pesquet, Lucas F. M. da Silva, Chiaki Sato

    Published 2013-04-01
    “…The major conclusion is that fracture toughness of the modified adhesives increased as the mass fraction of the TEMs increased.…”
    Get full text
    Article
  12. 32

    The use of thermally expandable microcapsules for increasing the toughness and heal structural adhesives by Guillaume Pesquet, Lucas F. M. da Silva, Chiaki Sato

    Published 2013-04-01
    “…The major conclusion is that fracture toughness of the modified adhesives increased as the mass fraction of the TEMs increased.…”
    Get full text
    Article
  13. 33

    Comparative Studies on the Interaction of Cochinchinenin A and Loureirin B with Bovine Serum Albumin by Tianming Yang, Hao Zhang, Haiyan Fu, Yuanbin She, Can Huang, Yan Hu, Liping Wang

    Published 2013-01-01
    “…Under simulated physiological conditions, it was demonstrated that the fluorescence quenching mechanisms between CA (or LB) and BSA as a static quenching mode, or a combined quenching (dynamic and static quenching) mode were related to concentration level of CA (or LB). …”
    Get full text
    Article
  14. 34

    Preparation and Characterization of Chitosan/Agar Blended Films: Part 2. Thermal, Mechanical, and Surface Properties by Esam A. Elhefian, Mohamed Mahmoud Nasef, Abdul Hamid Yahaya

    Published 2012-01-01
    “…Chitosan/agar (CS/AG) films were prepared by blending different proportions of chitosan and agar (considering chitosan as the major component) in solution forms. The thermal stability of the blended films was studied using thermal gravimetric analysis (TGA). …”
    Get full text
    Article
  15. 35

    Event-Triggered Stability Analysis of Semi-Markovian Jump Networked Control System with Actuator Faults and Time-Varying Delay via Bessel–Legendre Inequalities by Hongqian Lu, Chaoqun Guo, Yue Hu, Wuneng Zhou

    Published 2019-01-01
    “…The system dynamic is optimized while the network resource is saved by introducing an improved static event-triggered mechanism. For deriving a less conservative stability criterion, the Bessel–Legendre inequalities approach is employed to the stability analysis and plays a major role. …”
    Get full text
    Article
  16. 36

    Integration of Bayesian Networks with GIS for Dynamic Avalanche Hazard Assessment: NSDI Perspective by Ipek Yilmaz, Derya Ozturk

    Published 2018-01-01
    “…Natural hazard assessments are core to risk definition and early warning systems and play a fundamental role in the prevention of major damages. Traditional hazard identification methods are static. …”
    Get full text
    Article
  17. 37

    Fall detection via human posture representation and support vector machine by Kaibo Fan, Ping Wang, Yan Hu, Bingjie Dou

    Published 2017-05-01
    “…Accidental falls of elderly people are a major cause of fatal injuries, especially for those living alone. …”
    Get full text
    Article
  18. 38

    Effect of Co-Curricular Activities on Students’ Academic Performance in Selected Secondary Schools in Kabale Municipality. by Muhumuza, Aston

    Published 2024
    “…The development of a child’s body and mind demands proper nurturing and its physical and intellectual qualities are a few of the major determinants of his/her personality. Therefore, modern approaches to education emphasize on all-round development of the child. …”
    Get full text
    Thesis
  19. 39

    Interaction of Hyperoside with Human Serum Albumin and Effect of Glucose on the Binding by Jie Yang, Lingling Qu, Wenyue Yang, Yun Huang, Ning Jiao, Wenhong Zhan, Ding Zhao, Lijian Cui

    Published 2014-01-01
    “…The results suggested that Hyp quenched the endogenous fluorescence of HSA via a static quenching process with the distance of 1.95 nm between Hyp and HSA. …”
    Get full text
    Article
  20. 40

    A Comparative Study of Seismic Performance Evaluation of Reinforced Concrete Frame Structures Using Chinese and African Seismic Codes by Musaab Suliman, Liang Lu

    Published 2024-01-01
    “…Therefore, the purpose of this study is to identify each code’s advantages by comparing assessment of the seismic efficacy of moment resistance frame reinforced concrete (MRF-RC) frames using four different codes: the Ethiopian Building Code Standard (EBCS-8), the Egyptian Code for Design and Construction of Reinforced Concrete Structures (ECP-201), the Algerian Seismic Regulations (RPA-99), and the Chinese Code for Seismic Design of Buildings (GB-50011), the first three are the major codes used in Africa. The seismic provisions of these codes are compared and evaluated using nonlinear time-history analysis (NL-THA) and nonlinear static pushover to validate the results. …”
    Get full text
    Article