Showing 25,461 - 25,480 results of 33,243 for search 'Theorbo~', query time: 3.44s Refine Results
  1. 25461

    Multicast communication protocol based on quantum key distribution against trojan horse attacking by Hong-yang MA, Xing-kui FAN

    Published 2014-07-01
    “…The communication protocols of throughput, channel utilization, security proof were analyzed theoretically. By analyzing, the protocol can effectively counter Trojan horse attacking, guarantee the multicast communication information safely.…”
    Get full text
    Article
  2. 25462

    Dynamic Analysis of Internal Flow Field of Double-rectangular Cavity Hydrostatic Thrust Bearing by Zhang Yanqin, Quan Zhen, Feng Ya’nan, Kong Pengrui, Sun Jichang, Kong Xiangbin

    Published 2018-01-01
    “…Taking the Q1-205 type double-rectangular cavity hydrostatic thrust bearing as study object,the method combining theoretical analysis,dynamic simulation and experimental testing is used,aiming at the variation of oil film thickness under six inlet velocity and three working speed conditions,the velocity field,vorticity and pressure field are analyzed. …”
    Get full text
    Article
  3. 25463

    An exploration of the use of technology by congregations by S. Joubert, W. J. Schoeman

    Published 2015-12-01
    “…The aim is to provide an empirical and theoretical description of the situation in this regard. …”
    Get full text
    Article
  4. 25464

    Authoritarian practices on the rise? Reflections from a Médecins Sans Frontières research programme on the engagement between international humanitarian non-governmental organisati... by Andrew Cunningham, Sean Healy

    Published 2025-02-01
    “…The research was grounded in a theoretical framework which integrates the concepts of authoritarian practices (Glasius), regulatory practices, the differentiation between strategic and tactical levels of engagement, and conceptions of legitimacy.…”
    Get full text
    Article
  5. 25465

    Evaluation du risque de déstabilisation des infrastructures de haute montagne engendré par le réchauffement climatique dans les Alpes françaises by Pierre-Allain Duvillard, Ludovic Ravanel, Philip Deline

    Published 2015-09-01
    “…An index of destabilisation risk was constructed to identify and rank infrastructures at risk. This theoretical risk index includes a characterisation of hazards and a diagnosis of vulnerability. 10 % of the infrastructures were characterised by a high risk of destabilisation.…”
    Get full text
    Article
  6. 25466

    Intelligent System of Somatosensory Music Therapy Information Feedback in Deep Learning Environment by Nan Zhao

    Published 2021-01-01
    “…There is an inaccuracy problem in electrogram judgment, and deep learning has great advantages in signal feature extraction and classification. Based on the theoretical basis of Deep Belief Network (DBN) in deep learning, this paper proposes a method that combines the optimized Restricted Boltzmann machine (RBM) feature extraction model with the softmax classification algorithm. …”
    Get full text
    Article
  7. 25467

    RESEARCH ON DEFORMATION ZONE THICKNESS IN METAL SHEET SINGLE POINT INCREMENTAL FORMING PROCESS by YAO ZiMeng, LI Yan, YANG MingShun, ZHANG Wei, BAI Lang

    Published 2016-01-01
    “…This paper mainly research on deformation zone of conical parts from theoretical calculation and finite element simulation and experiment of these three kinds of aspects. …”
    Get full text
    Article
  8. 25468

    Fast and accurate deep learning scans for signatures of natural selection in genomes using FASTER-NN by Sjoerd van den Belt, Nikolaos Alachiotis

    Published 2025-01-01
    “…Furthermore, FASTER-NN can accurately identify selective sweeps in recombination hotspots, which is a highly challenging detection problem with very limited theoretical treatment to date.…”
    Get full text
    Article
  9. 25469

    Performance of Multimodel Schemes for Seasonal Precipitation over Indian Region by Vinay Kumar, Tirthankar Ghosh

    Published 2018-01-01
    “…A well-known statistical estimation theoretic approach, namely, Best Linear Unbiased Estimator (BLUE), is examined on 16 member models. …”
    Get full text
    Article
  10. 25470

    Design Approach of Tooth Profile Parameter for Harmonic Drive with Nice Meshing Performance by Dong Huimin, Zhang Jili

    Published 2018-01-01
    “…Analysis of fitting error and backlash demonstrates that the designed tooth profile of the rigid spline is very close to the theoretical conjugate curve,the backlash distribution is ideal,the contact ratio and maximum engaging depth are guaranteed,which proves that the tooth profile parameter design method is effective and can guarantee the meshing performance.…”
    Get full text
    Article
  11. 25471

    The circular economy for food in future cities. Good practices that define Smart Food by Franco Fassio, Elisa Cionchi, Alice Tondella

    Published 2020-12-01
    “…This essay makes its scientific contribution to define both the theoretical-practical framework where the Circular Economy for food is developing and, in particular, its application to the urban context. …”
    Get full text
    Article
  12. 25472

    Index modulation aided frequency hopping anti-jamming and encryption method based on rotation scrambling by Xinjin LU, Jing LEI, Yuxin SHI

    Published 2021-12-01
    “…In order to improve the anti-jamming ability and security of the wireless communication system, an index frequency-hopping anti-interference encryption method based on rotation scrambling was designed, which could be simply called encrypted index modulation frequency hopping spread spectrum (EIM-FHSS).Firstly, the wireless secret key was used to control multiple orthogonal frequency hopping patterns to determine the available frequencies at the current moment.The index of the active frequency (the frequency point with the modulation symbol) was used to transmit the bit information.Secondly, the secret key was used to employ scrambling encryption on the mapping table between information bits and the indexes, to ensure the security of the index bits.Finally, constellation rotation encryption was used on the symbols transmitted on the active frequency in the scheme, which ensured the security of symbol bits.Theoretical analysis and simulation results show that the proposed EIM-FHSS method has stronger security and anti-jamming abilities than the traditional IM-FHSS methods.…”
    Get full text
    Article
  13. 25473

    Multi-objective Optimization Design of Wet Friction Clutches by Jiang Kai, Li Hua, Chen Si, Li Shilei, Ren Rongzhi

    Published 2023-05-01
    “…The results show that the optimization method used in this study is effective and can provide theoretical reference for the design of the friction plate structure and the optimization of clutch parameters.…”
    Get full text
    Article
  14. 25474
  15. 25475

    Fictionality in “Fog on the Barrow-downs”: Myth and Reference by Sanja Ignjatović, Marija Budimski

    Published 2024-10-01
    “… Exploring fictionality as the link between imagined and referential reality, the paper draws on the theoretic al framework of cognitive narratology in examining the mechanisms on which the creation of myth relies in the narratives introduced at the beginning of J. …”
    Get full text
    Article
  16. 25476

    Calculation Method of the Meshing Force of Cycloid Pinwheel with Considering Position and Radius Combined Random Error of Pin by Wang Qiliang Zhu Min Chen Xinwen Ye Xiaofen Meng Yongshuai Gong Feng

    Published 2019-01-01
    “…It is difficult to accurately process the position and the radius of pins as theoretical values when cycloidal wheels and pin wheels are machined and assembled. …”
    Get full text
    Article
  17. 25477

    New Area Studies as an Epistemological Framework: Some Reflections of Knowledge Production and Positionality by Marianela Barrios Aquino

    Published 2025-01-01
    “…To present New Area Studies as an epistemological framework, in this theoretical intervention, I first engage with its origins in the field of Area Studies and the critiques aimed at it. …”
    Get full text
    Article
  18. 25478

    MOLECULAR MARKERS: IMPLEMENTATION IN CROP PLANT BREEDING FOR IDENTIFICATION, INTROGRESSION, AND GENE PYRAMIDING by I. N. Leonova

    Published 2014-12-01
    “…Over the past decades, wide theoretical and practical experience has been obtained in application of DNA markers for investigation of plant genetic diversity, construction of molecular genetic maps, mapping of genes and quantitative trait loci, and employment of molecular marker technologies in the development of commercial cultivars and breeding of crop lines. …”
    Get full text
    Article
  19. 25479

    Practical realization of chiral nonlinearity for strong topological protection by Xinxin Guo, Lucien Jezequel, Mathieu Padlewski, Hervé Lissek, Pierre Delplace, Romain Fleury

    Published 2025-01-01
    “…Based on an acoustic prototype design with non-local nonlinearities, we theoretically, numerically, and experimentally implement the nonlinear topological edge states that persist in all nonlinear degrees and directions without any frequency shift. …”
    Get full text
    Article
  20. 25480

    Warpage in wafer-level packaging: a review of causes, modelling, and mitigation strategies by Pallavi Praful, Chris Bailey

    Published 2025-02-01
    “…Warpage characterization techniques and modeling approaches, including theoretical, numerical, and emerging artificial intelligence and machine learning (AI/ML) methods, have been analyzed. …”
    Get full text
    Article