Suggested Topics within your search.
Suggested Topics within your search.
- Academic writing 1
- Agriculture 1
- Autonomy and independence movements 1
- Calculus 1
- Curricula 1
- Curriculum planning 1
- Decolonization 1
- Dissertations, Academic 1
- Economic policy 1
- Education 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic Health Records 1
- English language 1
- Entrepreneurship 1
- Film adaptations 1
- Foreign economic relations 1
- Grammar, Comparative and general 1
- History 1
- History and criticism 1
- International business enterprises 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Literary style 1
- MATHEMATICS / Mathematical Analysis 1
- Manufacturing processes 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
-
18181
On a novel lapping method for RB-SiC ceramic materials by integration of fixed-abrasive with even-sprayed micro-droplets
Published 2025-01-01“…With observation of surface microstructure, the ductile-regime removal mechanism will result in a high-quality surface, and the minimum roughness Sa 13.5 nm is obtained. Finally, based on the rough surface contact theory, the material removal mechanism is discussed by comparing the average penetration depth of the abrasive and the critical depth of ductile-brittle transition.…”
Get full text
Article -
18182
Evaluation of anterior fixed appliances on maxillary arch growth in preschool children
Published 2025-01-01“…Evaluation of both appliances on maxillary growth was carried out at baseline, 6 and 12 months. Finally, parental satisfaction was also recorded. …”
Get full text
Article -
18183
Retinal Fundus Image Registration via Vascular Structure Graph Matching
Published 2010-01-01“…A graph matching is then performed to find global correspondences between vascular bifurcations. Finally, a revised ICP algorithm incorporating with quadratic transformation model is used at fine level to register vessel shape models. …”
Get full text
Article -
18184
Dynamic Characteristics of Electrostatically Actuated Shape Optimized Variable Geometry Microbeam
Published 2015-01-01“…This analysis will be helpful in the optimal design of MEMS actuators. Finally, for more consideration, different residual stress, squeeze-film damping, and fringing effect models are introduced into the governing equation of motion and we compare the corresponding dynamic response.…”
Get full text
Article -
18185
In vitro interleukin 4 and interferon-gamma production by mononuclear cells from atopic dermatitis patients
Published 1993-01-01“…Addition of IL-2 (250 U/ml) to parallel cultures failed to restore IFN-γ production in AD patients. Finally, no IL-4 or IFN-γ activity could be detected in any of the sera. …”
Get full text
Article -
18186
Use of a Simple Mechanical Analogy to Analytically Tune the PD Controller of a Flexible Manipulator System
Published 2018-01-01“…A design methodology is finally established to analytically determine the optimal elements of the mount, corresponding to the optimal control gains. …”
Get full text
Article -
18187
Proxy re-encryption based multi-factor access control scheme in cloud
Published 2018-02-01“…Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.…”
Get full text
Article -
18188
RESEARCH ON VIBRATION FEATURE EXTRACTION METHOD OF RAIL TRANSIT VEHICLE SUBGRADE BASED ON WAVELET PACKET Teager DISPERSION ENTROPY
Published 2024-08-01“…The hoisting and transfer of electrical equipments such as transformers are weak links that are neglected in monitoring,and secondary damage caused by mechanical impact is very easy to occur.The impact response of transformer rail transit vehicle caused by subgrade vibration was studied.Firstly,the rail transit vehicle transformer coupling analysis model was established,and the response area of the rail transit vehicle transformer coupling analysis model under the action of subgrade vibration was obtained by finite element analysis.Then,a non⁃periodic transient response feature extraction method based on wavelet dispersion entropy was proposed.This method performed good sparsity segmentation of the whole frequency band through the optimal subband tree structure of wavelet packet,decomposed the one⁃dimensional data containing a variety of information into different dimensions,and realized the effective decomposition of signals.The impact characteristics of subband signals were enhanced by Teager energy operator(TEO),and the subband signals with impact response characteristics were selected by dispersion entropy.Finally,through the subgrade vibration simulation signal,it is verified that the proposed method can accurately extract the aperiodic transient impact response components from the coupling path interference.…”
Get full text
Article -
18189
A Novel Approach to Density Near-Zero Acoustic Metamaterials
Published 2015-01-01“…After discussing the dependence of the frequency response of the unit cell on the properties of the host, we show that it can be used to design near-zero acoustic filters with low insertion loss and steep roll-off. Finally, we show that it can be used to achieve simultaneous near-zero propagation at multiple, independently chosen frequencies.…”
Get full text
Article -
18190
Time is Confidence: Monetary Incentives Metacognitive Profile on Duration Judgment
Published 2025-01-01“…Our results showed that only high confidence individuals overestimated the context of monetary gain. Finally, we found a negative relationship between confidence and time perception, and that confidence bias at the maximum uncertainty duration of 450 ms is predictive of time perception. …”
Get full text
Article -
18191
United Nations and Gender Equality in Nigeria: A Reference of 2010-2020
Published 2022-12-01“…The study concludes that despite many conventions, commissions and declarations established and declared by UN and her agencies, the status of women is still suppressed by men, religion, institutions and cultures in Nigeria. It finally recommends that women status can only be enhanced and can contribute meaningfully to the socio economic and political development of our society if all forms of gender biases are removed and women are not regarded as inferior beings but as people created with equal endowment by God. …”
Get full text
Article -
18192
Research on the cooperative offloading strategy of sensory data based on delay and energy constraints
Published 2023-03-01“…The edge offloading of the internet of things (IoT) sensing data was investigated.Multiple edge servers cooperatively offload all or part of the sensing data initially sent to the cloud center, which protects data privacy and improves user experience.In the process of cooperative offloading, the transmission of the sensing data and the information exchange among edge servers will consume system resources, resulting in the cost of cooperation.How to maximize the offloading ratio of the sensing data while maintaining a low collaboration cost is a challenging problem.A joint optimization problem of sensing data offload ratio and cooperative scale satisfying the constraints of network delay and system energy consumption was formulated.Subsequently, a distributed alternating direction method of multipliers (ADMM) via constraint projection and variable splitting was proposed to solve the problem.Finally, simulation experiments were carried out on MATLAB.Numerical results show that the proposed method improved the network delay and energy consumption compared to the fairness cooperation algorithm (FCA), the distributed optimization algorithm (DOA), and multi-subtasks-to-multi-servers offloading scheme (MTMS) algorithm.…”
Get full text
Article -
18193
Research on Evolutionary Model and Dynamic Analysis for Internet Public Opinion Spreading
Published 2021-01-01“…Then, the evolutionary stable strategies of the Internet public opinion spreading system are studied. Finally, the influences of the stable strategy of the Internet public opinion spreading system are analyzed through simulation. …”
Get full text
Article -
18194
Facile colorimetric detection of As(V) in Rice with immobilized acid phosphatase on hollow metal-organic frameworks hybrid with peroxidase-like activity
Published 2025-01-01“…After comprehensive validation, this colorimetric method presented the advantages of wide linear range (10.0–1000.0 μg/L), low LOD (4.0 μg/L), nice accuracy (recovery of 93.7–109.6 %) and good selectivity. Finally, this method was applied to visual detection of As(V) in rice samples with different varieties.…”
Get full text
Article -
18195
Brd7 loss reawakens dormant metastasis initiating cells in lung by forging an immunosuppressive niche
Published 2025-02-01“…Flow cytometric and single-cell analyses reveal increased levels of pro-tumorigenic inflammatory and transitional neutrophils, CD8+ exhausted T cells, and CD4+ stress response T cells in lungs from female mice harboring Brd7-deficient metastases. Finally, attenuating this immunosuppressive milieu by neutrophil depletion, neutrophil extracellular trap (NET) inhibition, or immune checkpoint therapy abrogates metastatic outgrowth. …”
Get full text
Article -
18196
MAC mechanism based on link prediction and network coding
Published 2016-01-01“…In the protocol improved, high-level secondary nodes around the path determined is increased by the routing module using the cast nature of wireless networks that al-ready exists rationally, so that significantly increased the network coding opportunity, without many problems caused by the concentrating flows. Finally, to seek a more appropriate balance between data diffusion and coding opportunities, the optimal factor was discussed. …”
Get full text
Article -
18197
IMM4HT:an identification method of malicious mirror website for high-speed network traffic
Published 2019-07-01“…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
Get full text
Article -
18198
Research on the Resonance Characteristics of Rock under Harmonic Excitation
Published 2019-01-01“…Subsequently, the modal characteristics, as well as the influence of excitation frequency, the mechanical properties, and dimensions of the rock on its resonance frequency, are analyzed by using FEM. Finally, the ultrasonic test on artificial sandstones and materials of drill tools are carried out indoor, and the FFT transform method is adopted to obtain their resonance frequencies. …”
Get full text
Article -
18199
Lead Fractures in Deep Brain Stimulation during Long-Term Follow-Up
Published 2010-01-01“…If we suspect lead fracture, we must check the impedance of the electrode and to evaluate the side effects of voltage. Finally, we must conduct a radiological screening.…”
Get full text
Article -
18200
Vibration Reduction Method for Power Cabin of Torpedoes Based on Acoustic Metamaterials
Published 2024-12-01“…Then, for the supporting structure of the power cabin, a vibration reduction scheme based on acoustic metamaterials was proposed, and the simulation analysis finds that acoustic metamaterials have a significant inhibitory effect on vibration within the corresponding bandgap, and the attenuation of some measurement points can be as high as 11.95 dB. Finally, the validity of the vibration reduction scheme based on acoustic metamaterials is verified through tests, which provides an idea for solving the low and medium frequency vibration problem in the power cabin of the torpedo.…”
Get full text
Article