Showing 16,621 - 16,640 results of 29,723 for search 'Winaq~', query time: 2.09s Refine Results
  1. 16621

    Kinematics Analysis and Multi-objective Scale Synthesis of a New Three Translation Parallel Mechanism by Jianyuan Liu, Jianlin He, Zhixiong Jian, Junguo Gao

    Published 2020-12-01
    “…The kinematics equation of the mechanism is established,and the analytical expression of positive and inverse kinematics solution of the mechanism are derived,the singularity,workspace and dexterity of the mechanism are studied. Finally,a multi-objective optimization design model is established,with elite retention strategy of rapid and dominate the multi-objective optimization algorithm (NSGA-Ⅱ),the scale synthesis of the structural parameters is carried out,a set of Pareto optimal solutions are obtained by optimization. …”
    Get full text
    Article
  2. 16622

    Dietary L-proline supplementation ameliorates autism-like behaviors and modulates gut microbiota in the valproic acid-induced mouse model of autism spectrum disorder by Jingjing Fang, Ruixuan Geng, Seong-Gook Kang, Kunlun Huang, Tao Tong

    Published 2024-09-01
    “…RNA sequencing demonstrated that Pro can also alter the PFC transcriptomic profile distinguished by the regulation of genes involved in Parkinson disease, neuroactive ligand-receptor interaction, oxidative phosphorylation, and mitogen activated protein kinase signaling pathway. Overall, dietary Pro supplementation may be a promising intervention strategy for ASD.…”
    Get full text
    Article
  3. 16623

    Research on 5G MEC security assessment system and method by Qiucheng LU, Jinhui TANG, Congying BAO, Hao WU, Yusun FU

    Published 2023-08-01
    “…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
    Get full text
    Article
  4. 16624

    Equity-Oriented Train Timetabling with Collaborative Passenger Flow Control: A Spatial Rebalance of Service on an Oversaturated Urban Rail Transit Line by Chaoqi Gong, Baohua Mao, Min Wang, Tong Zhang

    Published 2020-01-01
    “…Based on the linear weighting technique, an iterative heuristic algorithm combining the tabu search and Gurobi solver is designed to solve the proposed model. Finally, a simple case with different-scale instances is used to verify that the proposed algorithm can obtain near-optimal solution efficiently. …”
    Get full text
    Article
  5. 16625

    Exploring Secondary Students’ Conceptions about Fire Using a Two-Tier, True/False, Easy-to-Use Diagnostic Test by Patrice Potvin, Yannick Skelling-Desmeules, Ousmane Sy

    Published 2015-07-01
    “…We then describe its administration to 221 secondary school students. We finally present, in an explorative and accessible manner, the results that were obtained. …”
    Get full text
    Article
  6. 16626

    Reliability and Validity of Recreational Fishing Motivation Scale inTurkish Population by Faik Ardahan

    Published 2014-11-01
    “…The variance explained by these subscales was %64.590. Finally, results revealed that Recreational Fishing Motivation Scale was a reliable and valid scale in the estimation of the motivational factors for recreational fishing in Turkish population.…”
    Get full text
    Article
  7. 16627

    The Efficacy of Strontium and Potassium Toothpastes in Treating Dentine Hypersensitivity: A Systematic Review by B. F. A. Karim, D. G. Gillam

    Published 2013-01-01
    “…Following a review of 94 relevant papers both from searching electronic databases (PUBMED) and hand searching of relevant written journals, 13 studies were identified, and 7 papers (1 for strontium-based toothpastes and 6 for potassium-based toothpastes) were finally accepted for inclusion. The main outcome measures were the methodology and assessment used by Investigators in studies designed to evaluate DH. …”
    Get full text
    Article
  8. 16628

    Block-chain abnormal transaction detection method based on adaptive multi-feature fusion by Huijuan ZHU, Jinfu CHEN, Zhiyuan LI, Shangnan YIN

    Published 2021-05-01
    “…Aiming at the problem that the performance of intelligent detection models was limited by the representation ability of original data (features), a residual network structure ResNet-32 was designed to automatically mine the intricate association relationship between original features, so as to actively learn the high-level abstract features with rich semantic information.Low-level features were more transaction content descriptive, although their distinguishing ability was weaker than that of the high-level features.How to integrate them together to obtain complementary advantages was the key to improve the detection performance.Therefore, multi feature fusion methods were proposed to bridge the gap between the two kinds of features.Moreover, these fusion methods can automatically remove the noise and redundant information from the integrated features and further absorb the cross information, to acquire the most distinctive features.Finally, block-chain abnormal transaction detection model (BATDet) was proposed based on the above presented methods, and its effectiveness in the abnormal transaction detection is verified.…”
    Get full text
    Article
  9. 16629

    TÜRKİYE EKONOMİSİNDE FİNANSAL LİBERALİZASYON VE EKONOMİK BÜYÜME ETKİLEŞİMİNİN ARDL YÖNTEMİ İLE ANALİZİ by Şerife ÖZŞAHİN

    Published 2012-06-01
    “…Finansal liberalizasyon politikalarının başarısının ülkenin finans sektörünün gelişmişliği, kurumsal kalite düzeyi, dışa açıklık ve eğitim seviyesi göre farklılaştığı dikkate alınarak bu değişkenlerin yer aldığı regresyonlar sonucu uzun ve kısa dönem katsayılar elde edilmiştir. …”
    Get full text
    Article
  10. 16630

    Study on the Analyzing and Simulating Method of Workspace of Force Reflecting Main Manipulator by Qu Jinxing, Feng Feng

    Published 2016-01-01
    “…According to the position information of collecting by 3D electromagnetic tracking system,through the quantitative and qualitative analysis,the correctness of the simulation method for solving the main manipulator workspace is verified. Finally,according to the shape volume of workspace,the location layout of the main manipulator on the operation table is decided,meanwhile,meanwhile,the characteristics and applications of the three kinds of main manipulator workspace solving methods are given,a basis for the kinematics performance index evaluation and preoperation surgical planning is provided.…”
    Get full text
    Article
  11. 16631

    Path-Tracking Control of Tilting Quadrotor UAV Based on Variable Structure Sliding Mode Control Method by Qinghua Liu, Ke Zhang, Yunfan Pan, Huan Zhang

    Published 2024-01-01
    “…The flight process is controlled using inner and outer loop control methods, and a sliding mode manifold control law for a tilting quadcopter unmanned aerial vehicle is designed using the hyperbolic tangent-sliding mode control method. Finally, MATLAB/Simulink was used to simulate the path-tracking process of the tilting quadcopter unmanned aerial vehicles, proving the stability of the controller.…”
    Get full text
    Article
  12. 16632

    Emergency Evacuation of Hazardous Chemical Accidents Based on Diffusion Simulation by Jiang-Hua Zhang, Hai-Yue Liu, Rui Zhu, Yang Liu

    Published 2017-01-01
    “…We then verify the validity and feasibility of the algorithm using Jinan, China, as a computational example. In the end, we compare the results from different scenarios to explore the key factors affecting the effectiveness of the evacuation process.…”
    Get full text
    Article
  13. 16633

    An Investigation on Water Quality of Darlik Dam Drinking Water using Satellite Images by Erhan Alparslan, H. Gonca Coskun, Ugur Alganci

    Published 2010-01-01
    “…Next, an investigation was made by multiple regression analysis between the unitless planetary reflectance values of the first four bands of the June 2005 Landsat TM image of the dam and WQ parameters, such as chlorophyll-a, total dissolved matter, turbidity, total phosphorous, and total nitrogen, measured at satellite image acquisition time at seven stations in the dam. Finally, WQ in the dam was studied from satellite images of the years 2004, 2005, and 2006 by pattern recognition techniques in order to determine possible water pollution in the dam. …”
    Get full text
    Article
  14. 16634

    One-Dimensional SnO2 Nanostructures: Synthesis and Applications by Jun Pan, Hao Shen, Sanjay Mathur

    Published 2012-01-01
    “…., gas sensor, lithium-ion batteries, and nanophotonics) associated with them. Finally, the review is concluded with some perspectives with respect to future research on 1D SnO2 nanostructures.…”
    Get full text
    Article
  15. 16635

    Indentation response of a NiTi shape memory alloy: modeling and experiments by C. Maletta, F. Furgiuele, E. Sgambitterra, M. Callisti, B. G. Mellor, R. J. K. Wood

    Published 2012-06-01
    “…To aid this analysis numerical simulations were performed, by using a commercial finite element (FE) softwarecode and a special constitutive model for SMAs, so as to understand better the microstructural evolution occurring during the indentation process. Finally, the FE model has been used to analyze the effects of temperature on the indentation response of the alloy. …”
    Get full text
    Article
  16. 16636

    Command Filter AILC for Finite Time Accurate Tracking of Aircraft Track Angle System Based on Fuzzy Logic by Chunli Zhang, Xu Tian, Yangjie Gao, Fucai Qian

    Published 2023-01-01
    “…Based on the Lyapunov stability theorem, all signals of the closed-loop system are bounded on the finite time interval 0,T, and the output of the system can track the desired trajectory accurately. Finally, the feasibility and effectiveness of the method are verified by MATLAB simulation results.…”
    Get full text
    Article
  17. 16637

    Les marges renaissantes : Amazigh, Juif, Noir. Ce que la révolution a changé dans ce « petit pays homogène par excellence » qu’est la Tunisie by Stéphanie Pouessel

    Published 2012-10-01
    “…Why include the fight against racial discrimination in the new constitution ? Finally, how can Tunisian Amazigh specificity develop under pressure from pan-Maghreb Amazigh activism ?…”
    Get full text
    Article
  18. 16638

    HDFS-oriented cryptographic key resource control mechanism by Wei JIN, Fenghua LI, Mingjie YU, Yunchuan GUO, Ziyan ZHOU, Liang FANG

    Published 2022-09-01
    “…The big data environment presents the characteristics of multi-user cross-network cross-access, multi-service collaborative computing, cross-service data flow, and complex management of massive files.The existing access control models and mechanisms are not fully applicable for big data scenarios.In response to the needs of fine-grained access control and multi-service strategy normalization for cryptographic data in the big data environment, starting from the scene elements and attributes of access control, the HDFS-oriented CKCM was proposed by mapping the cyberspace-oriented access control (CoAC) model.Subsequently, a fine-grained access control management model for HDFS was proposed, including management sub-models and management supporting models.The Z-notation was used to formally describe the management functions and management methods in the management model.Finally, the CKCM system was implemented based on XACML to realize fine-grained secure access control for managing file and secret keys in HDFS.…”
    Get full text
    Article
  19. 16639

    Priapism in Antipsychotic Drug Use: A Rare but Important Side Effect by Igne Sinkeviciute, Rune A. Kroken, Erik Johnsen

    Published 2012-01-01
    “…The case presents how a treatment regimen was finally established balancing antipsychotic efficacy to acceptable side effects and offers guidance to physicians regarding how antipsychotic-induced priapism may be resolved.…”
    Get full text
    Article
  20. 16640

    Multimodal Surgical and Medical Treatment for Extensive Rhinocerebral Mucormycosis in an Elderly Diabetic Patient: A Case Report and Literature Review by Paola Di Carlo, Roberto Pirrello, Giuliana Guadagnino, Pierina Richiusa, Antonio Lo Casto, Caterina Sarno, Francesco Moschella, Daniela Cabibi

    Published 2014-01-01
    “…These interventions may include combination therapy. Finally, a judicious multimodal treatment approach can improve appearance and optimize outcome in elderly patients.…”
    Get full text
    Article