Showing 17,641 - 17,660 results of 29,723 for search 'Winaq~', query time: 2.30s Refine Results
  1. 17641

    Fault Detection and Diagnosis for Gas Turbines Based on a Kernelized Information Entropy Model by Weiying Wang, Zhiqiang Xu, Rui Tang, Shuying Li, Wei Wu

    Published 2014-01-01
    “…In addition, we also extend the entropy to compute the information quantity of features in kernel spaces, which help to select the informative features for a certain recognition task. Finally, we introduce the information entropy based decision tree algorithm to extract rules from fault samples. …”
    Get full text
    Article
  2. 17642

    Functional analysis of the PcCDPK5 gene in response to allelopathic substances on p-hydroxybenzoic acid (p-HBA) stress in patchouli by Xiaofeng Liu, Jingru Zhou, Muhammad Zeeshan Ul Haq, Zhineng Fu, Guangtao Gu, Jing Yu, Ya Liu, Dongmei Yang, Huageng Yang, Yougen Wu

    Published 2025-02-01
    “…Calcium-dependent protein kinase (CDPK) is an important mediator for Ca2 + signal recognition and transduction, playing a crucial role in plant stress response. …”
    Get full text
    Article
  3. 17643

    A Novel Type of Non-coding RNA, nc886, Implicated in Tumor Sensing and Suppression by Yong Sun Lee

    Published 2015-06-01
    “…nc886 (=vtRNA2-1, pre-miR-886, or CBL3) is a newly identified non-coding RNA (ncRNA) that represses the activity of protein kinase R (PKR). nc886 is transcribed by RNA polymerase III (Pol III) and is intriguingly the first case of a Pol III gene whose expression is silenced by CpG DNA hypermethylation in several types of cancer. …”
    Get full text
    Article
  4. 17644

    Crack Identification Method of Steel Fiber Reinforced Concrete Based on Deep Learning: A Comparative Study and Shared Crack Database by Yang Ding, Shuang-Xi Zhou, Hai-Qiang Yuan, Yuan Pan, Jing-Liang Dong, Zhong-Ping Wang, Tong-Lin Yang, An-Ming She

    Published 2021-01-01
    “…Furthermore, the crack database is expanded by the migration learning method and the crack database is shared on the Baidu online disk. Finally, a concrete crack identification model based on YOLOv4 and Mask R-CNN is established. …”
    Get full text
    Article
  5. 17645

    Quantitative Prediction of Natural Fractures in Shale Oil Reservoirs by Lei Gong, Shuai Gao, Bo Liu, Jianguo Yang, Xiaofei Fu, Fei Xiao, Xiaocen Su, Rongzhi Fu, Qi Lu

    Published 2021-01-01
    “…Next, geomechanical simulation and fracture prediction were carried out on the model which was established with comprehensive consideration of the influencing factors of fracture distribution. Finally, the fracture distribution is evaluated comprehensively based on above prediction. …”
    Get full text
    Article
  6. 17646

    Bidirectional causality of physical exercise in retinal neuroprotection by Stephen K. Agadagba, Suk-yu Yau, Ying Liang, Kristine Dalton, Benjamin Thompson

    Published 2025-12-01
    “…In this review, we summarize the evidence linking physical exercise to eye disease and identify potential mediators of physical exercise-induced retinal neuroprotection. Finally, we discuss future directions for preclinical and clinical research in exercise and eye health.…”
    Get full text
    Article
  7. 17647

    Seismic Performance of Super High-Rise Building Structure with Dual Lines of Defense Based on Response Surface Optimization Algorithm by Lei Zheng, Zonghui Liu, Hongwei Dang, Xin Guo, Yonghua Wu

    Published 2022-01-01
    “…Then, the response surface method is used to optimize the material constitutive model and complete the seismic design of the second line. Finally, the anticollapse limit state analysis method is used to determine the seismic performance of the double line of super high-rise building structures. …”
    Get full text
    Article
  8. 17648

    Method, Design, and Evaluation of an Exoskeleton for Lifting a Load In Situ by Xin Li, Weihao Li, Qiang Li

    Published 2021-01-01
    “…In this design, the hydraulic cylinder for shoulder assistance, the motor for elbow assistance, and the spring for lower limb assistance were calculated and selected according to the motion and torque of each joint. Finally, subjective and objective methods were used to evaluate the exoskeleton based on the results of five test participants, and the median oxygen consumption of the whole test by lifting a load ten times with the assistance was found to be reduced by 9.45% as compared with that in the absence of the exoskeleton.…”
    Get full text
    Article
  9. 17649

    Influência do uso do intervalo HSV na capacidade de diferenciação da variável visual cor em mapas corocromáticos visualizados em meio digital by Monyra Guttervill Cubas, Tony Vinicius Moreira Sampaio

    Published 2021-11-01
    “…Chromatic maps visualized in digital media do not always allow users, especially those in teaching process, to correctly differentiate the themes present in them. Finally, results reinforced the need to use perceptually uniform color spaces for production of chorochromatic maps and indicated that the ability to differentiate colors in digital environment is similar to that already observed in printed maps.…”
    Get full text
    Article
  10. 17650

    Discovery of Novel Inhibitors for Nek6 Protein through Homology Model Assisted Structure Based Virtual Screening and Molecular Docking Approaches by P. Srinivasan, P. Chella Perumal, A. Sudha

    Published 2014-01-01
    “…Nek6 is a member of the NIMA (never in mitosis, gene A)-related serine/threonine kinase family that plays an important role in the initiation of mitotic cell cycle progression. …”
    Get full text
    Article
  11. 17651

    Cloud-Edge Collaboration Architecture and Key Technologies for 6G Integrated Satellite and Terrestrial Network by Yaqin SONG, Hui XU, Xianfeng LIU, Yapeng WANG, Zhimi CHENG, Hucheng WANG, Shanzhi CHEN

    Published 2023-09-01
    “…By analyzed the scenario characteristics of 6G integrated satellite and terrestrial network, the current state of research on edge computing capabilities on satellite, and the demand of cloud-edge collaboration, a network architecture that combines computing power network technology to achieve cloud-edge collaboration for integrated satellite and terrestrial networks was proposed, and global resource awareness and collaborative policy scheduling for integrated satellite and terrestrial networks by introducing a network function cloud-edge collaboration function was achieved .Based on this architecture, a unified resource management mechanism of the integrated satellite and terrestrial network was proposed, included a global resource awareness technology that could managed the computing and network resources of the integrated satellite and terrestrial network, and a policy generation technology that could collaborate with the computational capabilities of the cloud-edge and the integrated satellite and terrestrial network.Finally, the rationality of the cloud-edge collaborative architecture proposed in this article, as well as the correctness of resource awareness technology and policy scheduling technology, were verified through a self-developed mobile communication network platform.…”
    Get full text
    Article
  12. 17652

    Maximizing Free Energy Gain by Artemy Kolchinsky, Iman Marvian, Can Gokler, Zi-Wen Liu, Peter Shor, Oles Shtanko, Kevin Thompson, David Wolpert, Seth Lloyd

    Published 2025-01-01
    “…We also derive simple formulae that relate the free energy gained using the optimal initial state rather than another suboptimal initial state. Finally, we demonstrate that the problem of finding the optimal initial state may have two distinct regimes, one easy and one difficult, depending on the temperatures used for preparation and work extraction. …”
    Get full text
    Article
  13. 17653

    Regional heat and social attribute aware participant selection mechanis in mobile crowd sensing by Luoyong XIANG, Wen CHEN, Luyang ZHANG

    Published 2020-02-01
    “…Aiming at the problem of tasks that are low reliability acquired by platform and difficult to accomplish on time in user sparse area.A participant selection mechanism that combines regional heat and social attribute aware was proposed.Firstly,considering the influence of different regional heat on task completion,the regional heat was evaluated according to the number of active users,the average residence time of users and the completion of historical task.Secondly,in order to analyze the impact of user social attributes on task completion,the user willingness,reputation and activity were calculated by combining the status information of users and the historical task record of users.Finally,by taking the above factors into account,two different mechanisms of participant selection for social attribute perception were designed for high and low heat areas to maximize quality and number oftask completionrespectively.The results show that the proposed mechanism can significantly improve the overall data quality,and can also perform sensing tasks in sparse areas on time.Meanwhile,compared with SUR and GGA-I,the failure rate is reduced by 66.7% and 50.6% respectively.…”
    Get full text
    Article
  14. 17654

    Digital Image Forensic Approach to Counter the JPEG Anti-Forensic Attacks by Amit Kumar, Gurinder Singh, Ankush Kansal, Kulbir Singh

    Published 2021-01-01
    “…The proposed forensic scheme comprises of two steps i.e. selection of target difference image and generation of second-order statistical features by evaluating the Markov Transition Probability Matrices (MTPMs) for both intra and inter-block DCT domain. Finally, the resultant feature is used to train the SVM classifier for classification purposes. …”
    Get full text
    Article
  15. 17655

    Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network by Yuehui CHEN, Miao HUANG

    Published 2016-05-01
    “…In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was proposed.With elliptic curve cryptography and hash functions,random numbers were used to replace public key encryption and time stamp.Firstly,before using the roaming services of a foreign agent(FA),hash function was calculated.A host agent(HA)was used by mobile user to register.Then,authentication and session key were set up with elliptic curve encryption.If HA is always in FA,MU can update the session key with FA.Finally,through a common channel,MU could utilize HA to change their passwords.The analysis of the performance and safety shows that,compared with other similar programs,the proposed scheme has significantly improved efficiency and safety.And the virtual computing time is only 2.000 85 seconds,which sharply reduces the cost of computing.…”
    Get full text
    Article
  16. 17656

    An End-to-End Ocean Environmental Noise Anomaly Detection Framework Combining Time–Frequency Information and Expert Gating by Libin Du, Mingyang Liu, Zhichao Lv, Chuanhe Tan, Junkai He, Fei Yu

    Published 2025-01-01
    “…Secondly, a Gamma distribution-based residual analysis method for anomaly detection is designed, enhancing the robustness of anomaly detection. Finally, an anomaly optimization module is developed to improve data quality, enabling efficient noise anomaly detection and optimization. …”
    Get full text
    Article
  17. 17657

    Imperfect interfaces characterization in a multilayered structure by means of an equivalent dynamic model by Auquier Nicolas, Ege Kerem, Gourdon Emmanuel

    Published 2024-01-01
    “…The concurrently developed model enables the quantification of an interface parameter through experimental measurements. Finally, a detailed analysis of the results obtained through this methodology is provided, emphasizing the significant influence of imperfect interfaces on the dynamics of multilayered structures.…”
    Get full text
    Article
  18. 17658

    A Comprehensive Review of Quality of Life (QOL) Research in Hong Kong by Daniel T. L. Shek, Britta M. Lee

    Published 2007-01-01
    “…Seventh, most studies used measures of QOL rather than developed QOL measures. Finally, QOL data in Hong Kong were seldom compared with those in other places. …”
    Get full text
    Article
  19. 17659

    FUNDING SOCIAL ENTERPRISES TO ADVANCE THE ACHIEVEMENT OF THE SUSTAINABLE DEVELOPMENT GOALS. THE CASE OF THE SOCIAL IMPACT BONDS by Valentina PATETTA, Marta ENCISO-SANTOCILDES, Gabriel VELA-MICOULAUD

    Published 2023-06-01
    “…Then, the second part of the study will offer a framework for understanding as SIBs can be a tool for social enterprises. Finally, conclusions will be drawn about the innovative way of financing social enterprise initiatives represented by Social Impact Bonds.…”
    Get full text
    Article
  20. 17660

    Microfluidic platforms for monitoring cardiomyocyte electromechanical activity by Wei Wang, Weiguang Su, Junlei Han, Wei Song, Xinyu Li, Chonghai Xu, Yu Sun, Li Wang

    Published 2025-01-01
    “…Then, applications in common cardiac drug screening and cardiovascular disease modeling are presented, followed by design strategies for enhancing physiology studies. Finally, we discuss prospects in the tissue engineering and sensing techniques of microfluidic platforms.…”
    Get full text
    Article