Showing 18,181 - 18,200 results of 28,194 for search 'Winaq~', query time: 2.51s Refine Results
  1. 18181

    On a novel lapping method for RB-SiC ceramic materials by integration of fixed-abrasive with even-sprayed micro-droplets by Yang Yu, Xuanping Wang, Xiaoguang Guo, Hang Gao

    Published 2025-01-01
    “…With observation of surface microstructure, the ductile-regime removal mechanism will result in a high-quality surface, and the minimum roughness Sa 13.5 nm is obtained. Finally, based on the rough surface contact theory, the material removal mechanism is discussed by comparing the average penetration depth of the abrasive and the critical depth of ductile-brittle transition.…”
    Get full text
    Article
  2. 18182

    Evaluation of anterior fixed appliances on maxillary arch growth in preschool children by Mohamed Ghaly, Nahed Abo Hamila

    Published 2025-01-01
    “…Evaluation of both appliances on maxillary growth was carried out at baseline, 6 and 12 months. Finally, parental satisfaction was also recorded. …”
    Get full text
    Article
  3. 18183

    Retinal Fundus Image Registration via Vascular Structure Graph Matching by Kexin Deng, Jie Tian, Jian Zheng, Xing Zhang, Xiaoqian Dai, Min Xu

    Published 2010-01-01
    “…A graph matching is then performed to find global correspondences between vascular bifurcations. Finally, a revised ICP algorithm incorporating with quadratic transformation model is used at fine level to register vessel shape models. …”
    Get full text
    Article
  4. 18184

    Dynamic Characteristics of Electrostatically Actuated Shape Optimized Variable Geometry Microbeam by Sha Zhang, Wen-Ming Zhang, Zhi-Ke Peng, Guang Meng

    Published 2015-01-01
    “…This analysis will be helpful in the optimal design of MEMS actuators. Finally, for more consideration, different residual stress, squeeze-film damping, and fringing effect models are introduced into the governing equation of motion and we compare the corresponding dynamic response.…”
    Get full text
    Article
  5. 18185

    In vitro interleukin 4 and interferon-gamma production by mononuclear cells from atopic dermatitis patients by Serge Well, Friedhelm Diel

    Published 1993-01-01
    “…Addition of IL-2 (250 U/ml) to parallel cultures failed to restore IFN-γ production in AD patients. Finally, no IL-4 or IFN-γ activity could be detected in any of the sera. …”
    Get full text
    Article
  6. 18186

    Use of a Simple Mechanical Analogy to Analytically Tune the PD Controller of a Flexible Manipulator System by Sang-Myeong Kim, Heungseob Kim, Kwangsuck Boo

    Published 2018-01-01
    “…A design methodology is finally established to analytically determine the optimal elements of the mount, corresponding to the optimal control gains. …”
    Get full text
    Article
  7. 18187

    Proxy re-encryption based multi-factor access control scheme in cloud by Mang SU, Guozhen SHI, Anmin FU, Yan YU, Wei JIN

    Published 2018-02-01
    “…Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.…”
    Get full text
    Article
  8. 18188

    RESEARCH ON VIBRATION FEATURE EXTRACTION METHOD OF RAIL TRANSIT VEHICLE SUBGRADE BASED ON WAVELET PACKET Teager DISPERSION ENTROPY by ZHANG Min, SUN LongYin, XIA Tuo, ZHANG Xiong

    Published 2024-08-01
    “…The hoisting and transfer of electrical equipments such as transformers are weak links that are neglected in monitoring,and secondary damage caused by mechanical impact is very easy to occur.The impact response of transformer rail transit vehicle caused by subgrade vibration was studied.Firstly,the rail transit vehicle transformer coupling analysis model was established,and the response area of the rail transit vehicle transformer coupling analysis model under the action of subgrade vibration was obtained by finite element analysis.Then,a non⁃periodic transient response feature extraction method based on wavelet dispersion entropy was proposed.This method performed good sparsity segmentation of the whole frequency band through the optimal subband tree structure of wavelet packet,decomposed the one⁃dimensional data containing a variety of information into different dimensions,and realized the effective decomposition of signals.The impact characteristics of subband signals were enhanced by Teager energy operator(TEO),and the subband signals with impact response characteristics were selected by dispersion entropy.Finally,through the subgrade vibration simulation signal,it is verified that the proposed method can accurately extract the aperiodic transient impact response components from the coupling path interference.…”
    Get full text
    Article
  9. 18189

    A Novel Approach to Density Near-Zero Acoustic Metamaterials by Milan Sečujski, Norbert Cselyuszka, Vesna Crnojević-Bengin

    Published 2015-01-01
    “…After discussing the dependence of the frequency response of the unit cell on the properties of the host, we show that it can be used to design near-zero acoustic filters with low insertion loss and steep roll-off. Finally, we show that it can be used to achieve simultaneous near-zero propagation at multiple, independently chosen frequencies.…”
    Get full text
    Article
  10. 18190

    Time is Confidence: Monetary Incentives Metacognitive Profile on Duration Judgment by Mitra Taghizadeh Sarabi, Eckart Zimmermann

    Published 2025-01-01
    “…Our results showed that only high confidence individuals overestimated the context of monetary gain. Finally, we found a negative relationship between confidence and time perception, and that confidence bias at the maximum uncertainty duration of 450 ms is predictive of time perception. …”
    Get full text
    Article
  11. 18191

    United Nations and Gender Equality in Nigeria: A Reference of 2010-2020 by IJE O. JAIRUS, AJIYA SARAH, KARUEJE UCHE CHRISTOPER

    Published 2022-12-01
    “…The study concludes that despite many conventions, commissions and declarations established and declared by UN and her agencies, the status of women is still suppressed by men, religion, institutions and cultures in Nigeria. It finally recommends that women status can only be enhanced and can contribute meaningfully to the socio economic and political development of our society if all forms of gender biases are removed and women are not regarded as inferior beings but as people created with equal endowment by God. …”
    Get full text
    Article
  12. 18192

    Research on the cooperative offloading strategy of sensory data based on delay and energy constraints by Peiyan YUAN, Saike SHAO, Ran WEI, Junna ZHANG, Xiaoyan ZHAO

    Published 2023-03-01
    “…The edge offloading of the internet of things (IoT) sensing data was investigated.Multiple edge servers cooperatively offload all or part of the sensing data initially sent to the cloud center, which protects data privacy and improves user experience.In the process of cooperative offloading, the transmission of the sensing data and the information exchange among edge servers will consume system resources, resulting in the cost of cooperation.How to maximize the offloading ratio of the sensing data while maintaining a low collaboration cost is a challenging problem.A joint optimization problem of sensing data offload ratio and cooperative scale satisfying the constraints of network delay and system energy consumption was formulated.Subsequently, a distributed alternating direction method of multipliers (ADMM) via constraint projection and variable splitting was proposed to solve the problem.Finally, simulation experiments were carried out on MATLAB.Numerical results show that the proposed method improved the network delay and energy consumption compared to the fairness cooperation algorithm (FCA), the distributed optimization algorithm (DOA), and multi-subtasks-to-multi-servers offloading scheme (MTMS) algorithm.…”
    Get full text
    Article
  13. 18193

    Research on Evolutionary Model and Dynamic Analysis for Internet Public Opinion Spreading by Wei Zhang, Yong Chen

    Published 2021-01-01
    “…Then, the evolutionary stable strategies of the Internet public opinion spreading system are studied. Finally, the influences of the stable strategy of the Internet public opinion spreading system are analyzed through simulation. …”
    Get full text
    Article
  14. 18194

    Facile colorimetric detection of As(V) in Rice with immobilized acid phosphatase on hollow metal-organic frameworks hybrid with peroxidase-like activity by Zhiyang Qin, Zhuolan Xu, Yixin Liu, Xinguang Qin, Gang Liu, Xinlin Wei, Haizhi Zhang

    Published 2025-01-01
    “…After comprehensive validation, this colorimetric method presented the advantages of wide linear range (10.0–1000.0 μg/L), low LOD (4.0 μg/L), nice accuracy (recovery of 93.7–109.6 %) and good selectivity. Finally, this method was applied to visual detection of As(V) in rice samples with different varieties.…”
    Get full text
    Article
  15. 18195

    Brd7 loss reawakens dormant metastasis initiating cells in lung by forging an immunosuppressive niche by Jayanta Mondal, Junfeng Zhang, Feng Qing, Shunping Li, Dhiraj Kumar, Jason T. Huse, Filippo G. Giancotti

    Published 2025-02-01
    “…Flow cytometric and single-cell analyses reveal increased levels of pro-tumorigenic inflammatory and transitional neutrophils, CD8+ exhausted T cells, and CD4+ stress response T cells in lungs from female mice harboring Brd7-deficient metastases. Finally, attenuating this immunosuppressive milieu by neutrophil depletion, neutrophil extracellular trap (NET) inhibition, or immune checkpoint therapy abrogates metastatic outgrowth. …”
    Get full text
    Article
  16. 18196

    MAC mechanism based on link prediction and network coding by HANGFeng-jun S, juan GONGWen, Zhe GENG

    Published 2016-01-01
    “…In the protocol improved, high-level secondary nodes around the path determined is increased by the routing module using the cast nature of wireless networks that al-ready exists rationally, so that significantly increased the network coding opportunity, without many problems caused by the concentrating flows. Finally, to seek a more appropriate balance between data diffusion and coding opportunities, the optimal factor was discussed. …”
    Get full text
    Article
  17. 18197

    IMM4HT:an identification method of malicious mirror website for high-speed network traffic by Lei ZHANG, Peng ZHANG, Wei SUN, Xingdong YANG, Lichao XING

    Published 2019-07-01
    “…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
    Get full text
    Article
  18. 18198

    Research on the Resonance Characteristics of Rock under Harmonic Excitation by Siqi Li, Shenglei Tian, Wei Li, Tie Yan, Fuqing Bi

    Published 2019-01-01
    “…Subsequently, the modal characteristics, as well as the influence of excitation frequency, the mechanical properties, and dimensions of the rock on its resonance frequency, are analyzed by using FEM. Finally, the ultrasonic test on artificial sandstones and materials of drill tools are carried out indoor, and the FFT transform method is adopted to obtain their resonance frequencies. …”
    Get full text
    Article
  19. 18199

    Lead Fractures in Deep Brain Stimulation during Long-Term Follow-Up by Fernando Seijo Fernández, Marco Antonio Alvarez Vega, Aida Antuña Ramos, Fernando Fernández González, Beatriz Lozano Aragoneses

    Published 2010-01-01
    “…If we suspect lead fracture, we must check the impedance of the electrode and to evaluate the side effects of voltage. Finally, we must conduct a radiological screening.…”
    Get full text
    Article
  20. 18200

    Vibration Reduction Method for Power Cabin of Torpedoes Based on Acoustic Metamaterials by Xuyang SUN, Jingjun ZHOU, Qian WANG, Zhimin ZHANG

    Published 2024-12-01
    “…Then, for the supporting structure of the power cabin, a vibration reduction scheme based on acoustic metamaterials was proposed, and the simulation analysis finds that acoustic metamaterials have a significant inhibitory effect on vibration within the corresponding bandgap, and the attenuation of some measurement points can be as high as 11.95 dB. Finally, the validity of the vibration reduction scheme based on acoustic metamaterials is verified through tests, which provides an idea for solving the low and medium frequency vibration problem in the power cabin of the torpedo.…”
    Get full text
    Article