Showing 1,281 - 1,300 results of 9,503 for search 'Sveg~', query time: 2.77s Refine Results
  1. 1281
  2. 1282

    Tensile Behavior of Polyetheretherketone over a Wide Range of Strain Rates by Zakaria El-Qoubaa, Ramzi Othman

    Published 2015-01-01
    “…Polyetheretherketone (PEEK) is used in several engineering applications where it has to bear impact loads. …”
    Get full text
    Article
  3. 1283

    Construction mechanism for service path over reconfigurable service-centric network by Dan ZHAO, Feng WEN, Xin XU, Peng WANG, Bo CHEN

    Published 2016-10-01
    “…In order to enhance the flexible and intelligent network's service ability,a novel architecture called recon-figurable service-centric network (ReSCNet) was proposed which decomposed traditional network capabilities and ser-vices into fine-grained network functional unit.Then based on service routing matrix algorithm to orchestrate and deploy atomic service flexibly,a service path was built which possess smaller cost,lower time delay,higher degree of load bal-ance and higher reliability.Finally,the performance of service routing matrix algorithm was evaluated on the innovation experiment platform NetFPGA-10G.The simulation results show that the algorithm has a better performance and can cus-tomize an optimal service path for users while meet the specific functions and performance constraints.…”
    Get full text
    Article
  4. 1284

    Real Wage Growth in Papua New Guinea Over Three Decades by Niels‐Hugo Blunch, Martin Davies

    Published 2025-01-01
    “…Using a novel dataset, we construct the first longitudinal series of wages for (to a close approximation) the population of formal private sector workers in PNG over a 3 decades span from 1999 to 2018. We examine real wage growth for the formal private sector in PNG over a 20‐year period using panel regression. …”
    Get full text
    Article
  5. 1285

    Issues of identity verification of typical applications over mobile terminal platform by Xiaolin ZHANG, Dawu GU, Chi ZHANG

    Published 2020-12-01
    “…Recent studies have shown that attacks against USIM card are increasing,and an attacker can use the cloned USIM card to bypass the identity verification process in some applications and thereby get the unauthorized access.Considering the USIM card being cloned easily even under 5G network,the identity verification process of the popular mobile applications over mobile platform was analyzed.The application behaviors were profiled while users were logging in,resetting password,and performing sensitive operations,thereby the tree model of application authentication was summarized.On this basis,58 popular applications in 7 categories were tested including social communication,healthcare,etc.It found that 29 of them only need SMS verification codes to get authenticated and obtain permissions.To address this issue,two-step authentication was suggested and USIM anti-counterfeiting was applied to assist the authentication process.…”
    Get full text
    Article
  6. 1286
  7. 1287

    Dry eye disease and its treatment in women over 45 years by E.A. Drozdova, V.E. Balan

    Published 2021-05-01
    “…</i> </p> <p> <i><b>For citation: </b>Drozdova E.A., Balan V.E. Dry eye disease and its treatment in women over 45 years. …”
    Get full text
    Article
  8. 1288

    Optimal Index Code With Rate 4 Over F&#x2082; by Rajesh Neelakandan, Ganesan Kaliyaperumal

    Published 2025-01-01
    “…., maximizing the usage of broadcast channel which exploits the broadcast nature of the wireless medium through index coding). Index coding is the elegant and beautiful idea, which is used to transform the information source symbols for efficient broadcasting. …”
    Get full text
    Article
  9. 1289

    Classes of I-Convergent Double Sequences over n-Normed Spaces by Nazneen Khan

    Published 2016-01-01
    “…I introduce some new classes of I-convergent double sequences defined by a sequence of moduli over n-normed space. Study of their algebraic and topological properties and some inclusion relations has also been done.…”
    Get full text
    Article
  10. 1290
  11. 1291
  12. 1292

    Delay-sensitive data allocation scheme for CMT over diversity paths by Wen-feng DU, Zhen WU, Li-qian LAI

    Published 2013-04-01
    “…The performance of CMT association degrades remarkably when the performances of parts of paths deteriorate.Based on the analysis of different network configurations,a delay sensitive data allocation scheme was proposed to distribute data to different paths over multi-diversity network with reference of their transmission delay,which is a key factor to the whole performance.Meanwhile,the transmission sequence number of each chunk will also was considered.The result of analysis and simulation reveal the performance of our scheme can achieve much better performance than the original round-robin scheme.…”
    Get full text
    Article
  13. 1293

    Projectivity and flatness over the endomorphism ring of a finitely generated module by S. Caenepeel, T. Guédénon

    Published 2004-01-01
    “…We give necessary and sufficient conditions for projectivity and flatness of a module over the endomorphism ring of Λ.…”
    Get full text
    Article
  14. 1294

    Investigating the Applicability of the Peak Density Thickness Parameter over the Equatorial Region by Mohamed O. Shammat, Bodo W. Reinisch, Ivan Galkin, Philip J. Erickson, Jay A. Weitzen, William C. Rideout

    Published 2024-12-01
    “…This study builds on the previously established PDT concept, initially explored at midlatitudes using data from Millstone Hill, by evaluating its applicability and effectiveness over equatorial latitudes using data from the Jicamarca Incoherent Scatter Radar (ISR) in Lima, Peru. …”
    Get full text
    Article
  15. 1295
  16. 1296

    Linear Complexity of Generalized Cyclotomic Sequences of Order 4 over Fl by Yuhua Sun, Qiuyan Wang, Yang Yan, Tongjiang Yan, Hui Li

    Published 2020-01-01
    “…Generalized cyclotomic sequences of period pq have several desirable randomness properties if the two primes p and q are chosen properly. …”
    Get full text
    Article
  17. 1297

    Verification of ERA5 Hourly Air Temperature Data over Turkey by Meriç Yılmaz

    Published 2022-07-01
    “…Doğal Afetler ve Çevre Dergisi…”
    Get full text
    Article
  18. 1298

    Cumulative Dispensing of Oral Corticosteroids Over 12 Months in People with COPD by Burge AT, Cox NS, Dal Corso S, Jones AW, Faqih FM, Holland AE

    Published 2025-01-01
    “…Participants with a high cumulative dose were more likely to have had a respiratory admission (OR 4.1, 95% CI 2.3 to 8.7) and greater breathlessness (modified Medical Research Council scale ≥ 2, OR 2.5, 95% CI 1.3 to 5.0); no relationship with disease severity or maintenance medications was demonstrated.Conclusion: One in four people with COPD were dispensed unsafe lifetime cumulative OCS doses over a period of only 12 months. …”
    Get full text
    Article
  19. 1299

    Socioeconomic inequalities in high-risk fertility behaviors over time in Ethiopia. by Melash Belachew Asresie, Michael Ekholuenetale, Kedir Y Ahmed, Sabuj Kanti Mistry, Navira Chandio, Kingsley Agho, Gedefaw Abeje Fekadu, Amit Arora

    Published 2024-01-01
    “…<h4>Results</h4>The study showed that the concentration curve for HFRB remained above the equality line over time, indicating a disproportionate concentration among socioeconomically disadvantaged individuals. …”
    Get full text
    Article
  20. 1300

    Heatwave magnitude quantization and impact factors analysis over the Tibetan Plateau by Tongchang Zhang, Gang Deng, Xiuguo Liu, Yan He, Qikai Shen, Qihao Chen

    Published 2025-01-01
    “…Here, using refined data, we quantify the heatwave magnitude by aggregating multiple indicators into a comprehensive index and explore the influence of environmental factors on the heatwave magnitude over the TP. Our findings indicate that the heatwave magnitude has significantly increased since the 21st century, especially in autumn. …”
    Get full text
    Article