-
21
Finite Element and Multibody Dynamics Analysis of a Ball Mill Glass Crusher
Published 2023-01-01“…Recycling and sustainability constitute a major challenge to preserve human life quality and ensure a good standard of living for future generations. …”
Get full text
Article -
22
Small Surface Fatigue Crack Behaviors of Cr-Mo Steel AISI4137
Published 2024-12-01“…In other words, this major crack grew and developed a major ridge in the internal direction, determining the lifespan of the test specimen.…”
Get full text
Article -
23
Experimental study on strength degradation and meso-structural characteristics of saturated sandstone under freeze-thaw cycles
Published 2024-12-01“…Freeze-thaw damage to rock masses on slopes constitutes a major hazard in open-pit mining operations, particularly in the cold regions of the western area. …”
Get full text
Article -
24
Intelligent On/Off Dynamic Link Management for On-Chip Networks
Published 2012-01-01“…Power consumption, however, is a major limitation in NoCs today, and researchers have been constantly working on reducing both dynamic and static power. …”
Get full text
Article -
25
Optimization Manufacture of Virus- and Tumor-Specific T Cells
Published 2011-01-01“…Although ex vivo expanded T cells are currently widely used in pre-clinical and clinical trials, the complexity of manufacture remains a major impediment for broader application. In this review we discuss current protocols for the ex vivo expansion of virus- and tumor-specific T cells and describe our experience in manufacture optimization using a gas-permeable static culture flask (G-Rex). …”
Get full text
Article -
26
Moving target defense against network eavesdropping attack using POF
Published 2018-02-01“…Eavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches.Since existing encryption or dynamic address methods could only confuse part of fields of network protocols,they couldn’t form a comprehensive protection.Therefore a moving target defense method by utilizing the protocol customization ability of protocol-oblivious forwarding (POF) was proposed,through private protocol packet randomization strategy and randomly drop deception-packets on dynamic paths strategy.It could greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process.Experiments and compare studies show its efficiency.…”
Get full text
Article -
27
Research progress of triangle counting in big data
Published 2016-06-01“…Counting triangles in a graph is an important step to calculate the clustering coefficient and the transitivity ratio of the network,which is widely used in important role identification,spam detection,community discovery,biological detection etc.Counting triangles algorithm is mainly faced with two major problems of space-time consumption and accuracy.The representative algorithm of the counting triangles in the big graph was introduced.There existed two kinds of algorithms,which were exact counting algorithm and approximate counting algorithm.Exact counting algorithms were divided into internal memory algorithm,external memory algorithm and distributed algorithm.The space-time consumption or I/O consumption of exact counting algorithm was very large.Approximate counting algorithms were divided into auxiliary algorithm,static algorithm and streaming algorithm.In the end,the counting triangles algorithms were summarized.…”
Get full text
Article -
28
Low Dose X-Ray Sources and High Quantum Efficiency Sensors: The Next Challenge in Dental Digital Imaging?
Published 2014-01-01“…Objective(s). The major challenge encountered to decrease the milliamperes (mA) level in X-ray imaging systems is the quantum noise phenomena. …”
Get full text
Article -
29
On the Shoulders of Giants: Incremental Influence Maximization in Evolving Social Networks
Published 2017-01-01“…Previous studies mainly focus on designing efficient algorithms or heuristics on a static social network. As a matter of fact, real-world social networks keep evolving over time and a recalculation upon the changed network inevitably leads to a long running time. …”
Get full text
Article -
30
Novel Strategy to Improve the Performance of Localization in WSN
Published 2015-01-01“…In our model the discrete hidden Markov process plays a major role in analyzing the node location in heterogeneous media. …”
Get full text
Article -
31
The use of thermally expandable microcapsules for increasing the toughness and heal structural adhesives
Published 2013-04-01“…The major conclusion is that fracture toughness of the modified adhesives increased as the mass fraction of the TEMs increased.…”
Get full text
Article -
32
The use of thermally expandable microcapsules for increasing the toughness and heal structural adhesives
Published 2013-04-01“…The major conclusion is that fracture toughness of the modified adhesives increased as the mass fraction of the TEMs increased.…”
Get full text
Article -
33
Comparative Studies on the Interaction of Cochinchinenin A and Loureirin B with Bovine Serum Albumin
Published 2013-01-01“…Under simulated physiological conditions, it was demonstrated that the fluorescence quenching mechanisms between CA (or LB) and BSA as a static quenching mode, or a combined quenching (dynamic and static quenching) mode were related to concentration level of CA (or LB). …”
Get full text
Article -
34
Preparation and Characterization of Chitosan/Agar Blended Films: Part 2. Thermal, Mechanical, and Surface Properties
Published 2012-01-01“…Chitosan/agar (CS/AG) films were prepared by blending different proportions of chitosan and agar (considering chitosan as the major component) in solution forms. The thermal stability of the blended films was studied using thermal gravimetric analysis (TGA). …”
Get full text
Article -
35
Event-Triggered Stability Analysis of Semi-Markovian Jump Networked Control System with Actuator Faults and Time-Varying Delay via Bessel–Legendre Inequalities
Published 2019-01-01“…The system dynamic is optimized while the network resource is saved by introducing an improved static event-triggered mechanism. For deriving a less conservative stability criterion, the Bessel–Legendre inequalities approach is employed to the stability analysis and plays a major role. …”
Get full text
Article -
36
Integration of Bayesian Networks with GIS for Dynamic Avalanche Hazard Assessment: NSDI Perspective
Published 2018-01-01“…Natural hazard assessments are core to risk definition and early warning systems and play a fundamental role in the prevention of major damages. Traditional hazard identification methods are static. …”
Get full text
Article -
37
Fall detection via human posture representation and support vector machine
Published 2017-05-01“…Accidental falls of elderly people are a major cause of fatal injuries, especially for those living alone. …”
Get full text
Article -
38
Effect of Co-Curricular Activities on Students’ Academic Performance in Selected Secondary Schools in Kabale Municipality.
Published 2024“…The development of a child’s body and mind demands proper nurturing and its physical and intellectual qualities are a few of the major determinants of his/her personality. Therefore, modern approaches to education emphasize on all-round development of the child. …”
Get full text
Thesis -
39
Interaction of Hyperoside with Human Serum Albumin and Effect of Glucose on the Binding
Published 2014-01-01“…The results suggested that Hyp quenched the endogenous fluorescence of HSA via a static quenching process with the distance of 1.95 nm between Hyp and HSA. …”
Get full text
Article -
40
A Comparative Study of Seismic Performance Evaluation of Reinforced Concrete Frame Structures Using Chinese and African Seismic Codes
Published 2024-01-01“…Therefore, the purpose of this study is to identify each code’s advantages by comparing assessment of the seismic efficacy of moment resistance frame reinforced concrete (MRF-RC) frames using four different codes: the Ethiopian Building Code Standard (EBCS-8), the Egyptian Code for Design and Construction of Reinforced Concrete Structures (ECP-201), the Algerian Seismic Regulations (RPA-99), and the Chinese Code for Seismic Design of Buildings (GB-50011), the first three are the major codes used in Africa. The seismic provisions of these codes are compared and evaluated using nonlinear time-history analysis (NL-THA) and nonlinear static pushover to validate the results. …”
Get full text
Article