Showing 24,361 - 24,380 results of 29,723 for search 'Winaq~', query time: 2.45s Refine Results
  1. 24361

    Reanalysis of 500 hP patterns generating temperatures above 50 ° C in West Asia by Hadi Zerafati, Yousef Ghavidel, Manuchehr Farajzadeh

    Published 2024-03-01
    “…After identifying days whit above 50° c, HGT data at the level of 500 hp were extracted and WARD clustering was applied. Finally, after identifying the clusters, the days whit the highest temperature that occurred in each cluster were selected for synoptic analysis. …”
    Get full text
    Article
  2. 24362

    Effective optical and treatment zone analysis by means of cross-over differences after lenticule extraction by Hamed Haidari, Victor Derhartunian, Thomas Magnago, Maren-Christina Lengle, Samuel Arba-Mosquera

    Published 2025-01-01
    “…The advantages of this algorithm over existing methods are its objectivity; automation; speed; resolution, accuracy and precision; the free-form boundary determination; and finally its support in determining centration and circularity.…”
    Get full text
    Article
  3. 24363

    Research on the evolution, key technologies, and applications for AI enabled 5G-Advanced core network running by SHI Yuanyuan, WEI Bin, LI Aihua, XU Ming, ZHANG Yumin, SHEN Shen, MENG Han, JIANG Yu, LIU Le

    Published 2024-12-01
    “…Then, five key technologies and capabilities of AI enabled core network running were introduced. Finally, focusing on the typical service requirements of AI enabled core network running, the relevant solutions and their results were analyzed and summarized, thus providing new ideas for the application and implementation of 5G-A core network intelligence.…”
    Get full text
    Article
  4. 24364

    Physical activity, sedentary time and bone tissue: effects of an 8-months interdisciplinary program with overweight/obese children by Júlio Brugnara Mello, Luís Filipe Gomes Barbosa Pereira de Lemos, Luísa Maria Aires, Gustavo Silva, Rafael Miranda Tassitano, Jorge Augusto Mota, Anelise Reis Gaya, Clarice Maria De Lucena Martins

    Published 2019-05-01
    “…We observed a significant overall effect of the intervention on bone mineral density z-score changes, however after adjustments for changes in sedentary time and moderate to vigorous physical activity, no effect was observed. Finally, variations in sedentary time and in moderate to vigorous physical activity play an important role in bone mass density in those participants of the interdisciplinary program. …”
    Get full text
    Article
  5. 24365

    Le microphone dans la balance : espaces et enjeux sonores des procès historiques des attentats de Paris et de Nice by Aurore Juvenelle

    Published 2024-10-01
    “…Moreover, the judicial ritual is constrained by the need to remain fixed in front of the microphone. Finally, it is necessary to examine the stages of creation of the web radio, intended for civil parties, characterized in particular by a modification of the law and the code of criminal procedure.These first elements lay the foundations for a reflection on listening to historical terrorism trials without which the analysis of the content of the debates, which will be done elsewhere, would be biased.…”
    Get full text
    Article
  6. 24366

    A Systematic Review of Experimental Studies on STEM Education by Mustafa Tevfik Hebebci

    Published 2023-01-01
    “…Then, this number was reduced to 34 by applying the inclusion and exclusion criteria. Finally, the studies were examined in detail, and 12 articles that were not suitable were excluded from the scope. …”
    Get full text
    Article
  7. 24367

    Application of EMD Technology in Leakage Acoustic Characteristic Extraction of Gas-Liquid, Two-Phase Flow Pipelines by Jian Ji, Yuxing Li, Cuiwei Liu, Dongxu Wang, Huafei Jing

    Published 2018-01-01
    “…Upon increases in the leakage aperture sizes, the entropy of the EMD information of the acoustic signals gradually increases. Finally, the method of the normalized energies characteristic value of each IMF component is also applied in leakage signal processing. …”
    Get full text
    Article
  8. 24368

    Comparison of CRISPR-Cas13b RNA base editing approaches for USH2A-associated inherited retinal degeneration by Lewis E. Fry, Lauren Major, Ahmed Salman, Lucy A. McDermott, Jun Yang, Andrew J. King, Michelle E. McClements, Robert E. MacLaren

    Published 2025-02-01
    “…We develop and characterize a mouse model of Usher syndrome carrying the c.11840 G > A mutation designed for the evaluation of base editors for inherited retinal disease. Finally, we compare Cas13 effectors delivered via AAV for the repair of Ush2a in photoreceptors. …”
    Get full text
    Article
  9. 24369

    Evaluating Long-Term Strength and Time to Failure of Sandstone with Different Initial Damage by Rongbin Hou, Yanke Shi, Leige Xu, Jinwei Fu, Kai Zhang

    Published 2020-01-01
    “…The results show that, with the increase in the initial damage, the LTS of rock decreases and the relationship between the initial damage and the LTS of rock can be described as a linear function. Finally, an evaluation method for predicting the creep failure time of rock under a single stress level was proposed. …”
    Get full text
    Article
  10. 24370

    The Issue of Subway Commuters’ Departure Time Choices under the Influence of Bike-Sharing by Jie Yu, Jie Wang, Qiang Wen, Tao Chen

    Published 2024-01-01
    “…Conversely, during the departure timeframes that lead to late arrival at work, the traditional model overestimates both the departure rate and total number of commuters. Finally, through case analysis, we further revealed the dynamic relationship between commuter departure rates, commuting fatigue, and number of bike-sharing and calculated the actual commuting costs for different proportions of bike-sharing. …”
    Get full text
    Article
  11. 24371

    Risk Prediction Algorithm of Social Security Fund Operation Based on RBF Neural Network by Linxuan Yang

    Published 2021-01-01
    “…Then, put forward the corresponding risk treatment scheme to the warning signal. Finally, the RBF neural network is used for comprehensive risk warning. …”
    Get full text
    Article
  12. 24372

    Field Development Optimization for Low-Productivity Gas Wells under Intermittent Production by Wei Tian, Yi Liu, Xuri Li, Youliang Jia, Yixuan Wang, Li Li, Zhengyan Zhao, Weihong Ding, Wenxin Zhou, Wenyue Sun

    Published 2024-12-01
    “…The test results show that the trained model accurately predicted all selected key cycle parameters, with R2 values ranging from 0.91 to 0.99. Finally, the optimization method was applied to 100 wells in the gas field for real-time validation. …”
    Get full text
    Article
  13. 24373

    Real-Time Return Demand Prediction Based on Multisource Data of One-Way Carsharing Systems by Dongbo Liu, Jian Lu, Wanjing Ma

    Published 2021-01-01
    “…Based on these data, a return demand prediction model was used to predict whether the user will return the vehicle in 15 min in real time, and a destination station prediction model was applied to forecast which station the user will park at. Finally, a case study using ten stations’ one-week field data was conducted to test the benefit of the dynamic return demand prediction. …”
    Get full text
    Article
  14. 24374

    Performance Improvement in Pile Anchor System for Deep Foundation Excavation Using Electroosmotic Chemical Treatment by Lei Zhang, Bing-Hui Wang, Li-Yan Wang, Li-Ping Jing, Chen Fang, Zhen-Dong Shan

    Published 2019-01-01
    “…In addition, static load tests were conducted on the tested soil to measure the anchoring force. Finally, parametric analyses were performed to investigate effects of several parameters on anchoring force in terms of the ultimate pull-out capacity of the anchor, identifying critical parameters for the field study. …”
    Get full text
    Article
  15. 24375

    Using Intuitionistic Fuzzy TOPSIS in Site Selection of Wind Power Plants in Turkey by Babak Daneshvar Rouyendegh, Abdullah Yildizbasi, Ümmühan Z. B. Arikan

    Published 2018-01-01
    “…The IFS are used to reflect approval, rejection, and hesitation of decision makers by dealing with real life uncertainty, imprecision, vagueness, and linguistic human decisions. Finally, a numerical example is applied for wind power plant site selection. …”
    Get full text
    Article
  16. 24376

    Improving panicle blast resistance and fragrance in a high-quality japonica rice variety through breeding by Junhua Ye, Junhua Ye, Kai Wang, Yi Wang, Zhipeng Zhao, Ying Yan, Hang Yang, Lixia Zhang, Lixia Zhang, Zejun Hu, Zejun Hu, Zhenying Shi, Dapeng Sun, Jianjiang Bai, Liming Cao, Liming Cao, Shujun Wu, Shujun Wu

    Published 2025-01-01
    “…Pigm and Pi-ta are two dominant genes known for their stable broad-spectrum resistance against rice blast fungus Magnaporthe oryzae, while badh2 is the crucial gene that regulates rice aroma.MethodsIn this study, we utilized a molecular marker-assisted selection backcrossing strategy to introduce Pigm, Pi-ta, and badh2 into introgressed lines employing re-sequencing for precise genetic background selection.ResultsFinally, we selected three introgressed lines, including two that carry Pigm with the highest background recovery rates, showing eating and cooking qualities similar to those of HR1212, and one line that pyramids Pigm, Pi-ta, and badh2, which features a strong aroma. …”
    Get full text
    Article
  17. 24377

    Improving breaking efficiency of hard rock: Research on the mechanism of impact-shear rock breaking technology by Pei Ju, Dongzhuang Tian

    Published 2025-01-01
    “…Notably, for the impact-shear bit, the fluctuation of drilling force was effectively mitigated, the stick–slip vibration of bit was weakened, the rock-breaking energy consumption was drastically reduced, and the rock-breaking efficiency and bit’s life were finally improved. In terms of rock stress characteristics, the pre-impact effect of the central hammer bit of the impact-shear bit can release the internal stress of the rock well, and the stress of the rock element on the hole wall was relatively reduced, thus making it easier for the external PDC bit to break the rock. …”
    Get full text
    Article
  18. 24378

    Embedding of national cryptographic algorithm in Hyperledger Fabric by Qi CAO, Shuhua RUAN, Xingshu CHEN, Xiao LAN, Hongxia ZHANG, Hongjian JIN

    Published 2021-02-01
    “…Hyperledger Fabric is an extensible alliance blockchain platform and provides support for enterprise-level commercial blockchain projects.The cryptographic algorithm is the core technologies of the platform, ensuring the security and non-tampering of the data on the chain.But the original Fabric platform lacks the national cryptographic algorithm support.The embedding and support of the national cryptographic algorithm of the Fabric platform was designed and implemented.Firstly, the interaction logic of between components and the invocation scenario of each type of cryptographic algorithm in the Fabric platform were analyzed, an idea of embedding national cryptographic algorithm support for the platform was proposed.Secondly, the modules and interfaces for SM2, SM3 and SM4 were added to BCCSP of the Fabric platform based on the open source code of national cryptographic algorithm implementation.Thirdly, the interface of cryptographic algorithm invoked by the upper layer of each component is associated to the interface of corresponding national cryptographic algorithms, which realized the invocation support of national cryptographic algorithm for the upper layer applications.Finally, the correctness and effectiveness of the embedded national cryptographic algorithm were verified by creating a fabric-gm test instance.And compared with the performances of the test instance built by the mirror of the native Fabric platform.The experimental results show that the embedded national cryptographic algorithm interfaces are corrected and the generated national cryptographic certificates are effective.Moreover, compared with the native Fabric platform, the network start up time increases by about 3%.In the millisecond unit, the transaction time cost increases by about one time, the dynamic certificate generation time increases by about 9%, and all the performance are within the acceptable range.…”
    Get full text
    Article
  19. 24379

    Hybrid optimization method for optimal site selection and sizing of a hybrid photovoltaic water pumping/diesel/battery system by Akbar Maleki, Fatemehzahra Heydari, Ali Jabari Moghadam

    Published 2025-01-01
    “…PV/Battery) reveals that the PV/Diesel/Battery hybrid system offers the lowest costs and highest reliability. Finally, a sensitivity analysis is conducted on component prices, interest rates, and fuel prices to examine the results.…”
    Get full text
    Article
  20. 24380

    Development of Space Weather Reasonable Worst‐Case Scenarios for the UK National Risk Assessment by Mike Hapgood, Matthew J. Angling, Gemma Attrill, Mario Bisi, Paul S. Cannon, Clive Dyer, Jonathan P. Eastwood, Sean Elvidge, Mark Gibbs, Richard A. Harrison, Colin Hord, Richard B. Horne, David R. Jackson, Bryn Jones, Simon Machin, Cathryn N. Mitchell, John Preston, John Rees, Neil C. Rogers, Graham Routledge, Keith Ryden, Rick Tanner, Alan W. P. Thomson, James A. Wild, Mike Willis

    Published 2021-04-01
    “…We show how these scenarios are also considered as an ensemble so that government officials can prepare for a severe space weather event, during which many or all of the different scenarios will materialize. Finally, we note that this ensemble also needs to include insights into how public behavior will play out during a severe space weather event and hence the importance of providing robust, evidence‐based information on space weather and its adverse impacts.…”
    Get full text
    Article