Showing 6,461 - 6,480 results of 21,467 for search 'THE~', query time: 1.92s Refine Results
  1. 6461

    Structural and Optical Properties of Amorphous Al2O3 Thin Film Deposited by Atomic Layer Deposition by Shuzheng Shi, Shuo Qian, Xiaojuan Hou, Jiliang Mu, Jian He, Xiujian Chou

    Published 2018-01-01
    “…The refractive index and extinction coefficient are related to the variation of thickness and the samples surface quality of amorphous network structure in the thin films. The outstanding optoelectronic properties and facile fabrication of Al2O3 films amorphous structure can be extended to other similar oxides, which could display wide applications in various engineering and industrial fields.…”
    Get full text
    Article
  2. 6462

    Adsorption for copper(II) ion with chitosan-SP/PET composite adsorbent enhanced by electric field by Yunfei Song, Aiqun Kong, Yanhong Ji, Benqiao He, Hong Wang, Jianxin Li

    Published 2019-05-01
    “…And the energy consumption was economical, about 4.35 × 10 −3 kW·h for 1 m 3 of water with 10 mg L −1 Cu(II). It was suggested that the adsorption performance for Cu(II) with CS-SP/PET adsorbent was enhanced due to the enrichment of Cu(II) under electric field. …”
    Get full text
    Article
  3. 6463
  4. 6464

    A Novel Adjuvant “Sublancin” Enhances Immune Response in Specific Pathogen-Free Broiler Chickens Inoculated with Newcastle Disease Vaccine by Yangke Liu, Jiang Zhang, Shuai Wang, Yong Guo, Tao He, Rui Zhou

    Published 2019-01-01
    “…Experiment 2: SPF broiler chicks were divided into 1 of 3 groups, i.e., blank control (BC), vaccine control (VC), and sublancin treatment (ST). …”
    Get full text
    Article
  5. 6465

    Traceable attribute-based encryption scheme with key-delegation abuse resistance by Xixi YAN, Xu HE, Tao LIU, Qing YE, Jinxia YU, Yongli TANG

    Published 2020-04-01
    “…Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.…”
    Get full text
    Article
  6. 6466

    Cross-protective effect of acid adaptation on ethanol tolerance in Salmonella Enteritidis by Shoukui He, Beining Ye, Zengfeng Zhang, Yan Cui, Siyun Wang, Xianming Shi

    Published 2023-07-01
    “…It was observed that preadaptation to pH 4.5 significantly (P < 0.05) increased the tolerance of log-phase cells to ethanol; in contrast, stationary-phase cells displayed reduced ethanol tolerance after acid adaptation. …”
    Get full text
    Article
  7. 6467

    C-Reactive Protein Knockout Attenuates Temporomandibular Joint Inflammation in Rats by Yao He, Mengjiao Zhou, Zixiang Jian, Lingli Fang, Lan Huang, Jinlin Song

    Published 2022-01-01
    “…Freund’s complete adjuvant (CFA) was used to induce TMJ inflammation in CRP-knockout (CRP-/-) and control rats. …”
    Get full text
    Article
  8. 6468

    Optimization on Reasonable Construction State for Cable-Stayed Bridge with Steel Box Girder Based on Multi-Objective Programming Algorithm by Junbiao He, Wenhao Chai, Weiming Hu, Jie Dai, Jin Di, Fengjiang Qin

    Published 2024-12-01
    “…First, a multi-objective programming model was established, taking the bending moments of the main girder and pylon, as well as cable forces, as objective functions. …”
    Get full text
    Article
  9. 6469

    Clinical significance of establishing a red blood cell alloantibody detection database by XIAO Xiao, CHEN Long, ZHAO Zhenyu, HE Zhanghan, ZHOU Mengjun, TANG Jie

    Published 2025-01-01
    “…The predominant antibody in the Rh blood group system was anti-E. In the univariate analysis, the positivity of antibody was significantly associated with the patient's gender, age, blood transfusion history, pregnancy history and type of disease (all P<0.001). …”
    Get full text
    Article
  10. 6470

    Diagnostic Value of Interferon-Gamma Release Assays Combined with Multiple Indicators for Tuberculous Peritonitis by Xidong He, Yuanxue Gao, Qi Liu, Zhifang Zhao, Wanhang Deng, Hong Yang

    Published 2020-01-01
    “…To investigate the diagnostic value of interferon-gamma release assays combined with multiple indicators for tuberculous peritonitis. Methods. Patients who were admitted to the hospital due to suspected tuberculous peritonitis were prospectively included during the 30-month study period. …”
    Get full text
    Article
  11. 6471

    Blockade of Vascular Endothelial Growth Factor Receptor 1 Prevents Inflammation and Vascular Leakage in Diabetic Retinopathy by Jianbo He, Hong Wang, Ying Liu, Wen Li, Dorothy Kim, Hu Huang

    Published 2015-01-01
    “…Diabetic retinopathy (DR) is a leading cause of blindness in working age adults. The objective of this study is to investigate the effects of vascular endothelial growth factor receptor 1 (VEGFR1) blockade on the complications of DR. …”
    Get full text
    Article
  12. 6472

    Analysis on Sealing Performance for a New Type of Rubber Olecranon-Shaped Sealing Ring in Pipe Jacking Joint by Yi Zhang, Zaiqian Chen, Duoxian Wu, Hao Yan, Qiao He, Lei Wang

    Published 2022-01-01
    “…To address the easy damage of rubber sealing rings for pipe joints used in China’s first rock pipe jacking project, the launch of research concerning the optimization design of rubber ring structure was decided. …”
    Get full text
    Article
  13. 6473

    APPLICATION RESEARCH OF REMESHING TECHNIQUE ON RUBBER NUMERICAL SIMULATION by LV FengXia, ZHOU Li, YUAN HuiXin, ZHANG Yan, YANG He

    Published 2018-01-01
    “…For the large deformation and distortion of the mesh on the numerical simulation of rubber,using the solving and transformation between grids of the adaptive technique of Abaqus software,the rubber model was remeshed several times. …”
    Get full text
    Article
  14. 6474

    Tooth Profile Design of Tri-arc Harmonic Gear Drive by Xiao Jichang, He Xiaofei, Yang Yong, Wang Jiaxu, Huang Yanyan, Zhou Qinghua

    Published 2019-01-01
    “…The research results show that the tri-arc harmonic gear drive has a wider conjugate zone and a smaller interval between conjugate zones than the double circular arc harmonic drive. …”
    Get full text
    Article
  15. 6475
  16. 6476

    Moisture Migration and Control of New Embankment for Reconstruction and Expansion Project in Southern China by Junhui Zhang, Feng Li, Ling Zeng, Junhui Peng, Le Ding, Liang He

    Published 2020-01-01
    “…In hot and humid regions of southern China, the volumetric moisture content of the embankment after opening to traffic for a period of time reaches a stable state, and it is higher than the design value. …”
    Get full text
    Article
  17. 6477
  18. 6478

    Study on the Influence of Sand Core Compactness on Surface Entropy considering Engineering Disturbance by Ding-li Su, Hang Chen, Xuemiao Xu, Mengxiong Tang, He-song Hu

    Published 2021-01-01
    “…The two-dimensional entropy reveals the internal correlation mechanism of the influence of the engineering state on the surface structure of sand more clearly than the one-dimensional entropy and more effectively characterizes the dense degree of sand particles. (5) Using two-dimensional entropy to judge the compactness of sand image in the same borehole, the data fluctuation is small, and the algorithm is stable and reliable. …”
    Get full text
    Article
  19. 6479

    Lightweight anomaly detection model for UAV networks based on memory-enhanced autoencoders by HU Tianzhu, SHEN Yulong, REN Baoquan, HE Ji, LIU Chengliang, LI Hongjun

    Published 2024-04-01
    “…The message queue based on the operating system was used for data packet caching to achieve persistent processing of high-speed data streams, which effectively improved the stability and reliability of the model. …”
    Get full text
    Article
  20. 6480

    Environmental impacts of crop production systems in subtropical plateau regions: case study of Yunnan, China by Yousheng He, Minghao Li, Wei Zhang, Xinping Chen, Zhengxiong Zhao, Zhi Yao

    Published 2024-12-01
    “…The yield and total nutrient input of grain crops in Yunnan Province increased over the 20-year period, and the environmental footprint of crop production in Yunnan Province was higher than that in other regions. The average annual mean greenhouse gas (GHG) emissions, soil acidification potential (AP), and water eutrophication potential (EP) of crop production from 2002 to 2021 were 837 kg CO2-eq·Mg−1, 15.7 kg SO2-eq·Mg−1, and 2.71 kg PO4-eq Mg−1, respectively. …”
    Get full text
    Article