Showing 247,981 - 248,000 results of 265,139 for search 'be*', query time: 1.19s Refine Results
  1. 247981

    4-Chlorocurcumin by Phuong-Truc T. Pham, Mamoun M. Bader

    Published 2025-01-01
    “…The title compound [systematic name: 4-chloro-5-hydroxy-1,7-bis(4-hydroxy-3-methoxyphenyl)hepta-1,4,6-trien-3-one], C21H19ClO6, is close to planar, with a dihedral angle of 2.61 (7)° between the terminal phenyl groups and three intramolecular O—H...O hydrogen bonds occur. …”
    Get full text
    Article
  2. 247982

    Effect of Deficiencies in the Tunnel Crown Thickness on Pressure Tunnels with Posttensioned Concrete Linings by Gan Qin, Shengrong Cao, Fan Yang

    Published 2018-01-01
    “…The posttensioned concrete lining can still maintain a satisfactory stress state when deficiencies in the tunnel crown thickness exist, and undesirable stress levels may be caused only when the tunnel crown thickness decreases below a certain threshold. Furthermore, cracks are most likely to occur at the external and internal surfaces of the crown and at the internal surface of the crown’s adjacent parts, which is useful for taking measurements regarding the lining tightness and stability.…”
    Get full text
    Article
  3. 247983

    Body image and appearance distress among military veterans and civilians with an injury-related visible difference: A comparison study. by Mary Keeling, Diana Harcourt, Paul White, Sarah Evans, Victoria S Williams V, James Kiff, Heidi Williamson

    Published 2025-01-01
    “…Based on these identified associated factors, it is suggested that both groups, but particularly veterans, may benefit from an Acceptance and Commitment Therapy-based intervention, including explicit self-compassion activities, and practical social skills training.…”
    Get full text
    Article
  4. 247984

    A Double-Threshold Based Spectrum Allocation Algorithm in Cognitive Radio System by Jiongtao Wang, Ming Jin, Youming Li, Jingjing Zheng

    Published 2013-08-01
    “…Based on the spectrum allocation of Underlay model in cognitive radio systems,a double-threshold based spectrum allocation algorithm was proposed.Two signal-to-noise radio(SNR)thresholds were also given.If SNR is less than the small threshold,aiming to maximize the channel capacity of the primary users,some second users are chosen to cooperate with primary users to communicate data.If SNR is larger than the big threshold,considering to maximize the number of the second users accessing the spectrum,some second users are allowed to use the occupied spectrum with low power.If SNR is between the two thresholds,primary users occupy the spectrum alone.Simulation and numerical results illustrate the reliability of the theoretical analysis.…”
    Get full text
    Article
  5. 247985
  6. 247986

    DeepEye: Link Prediction in Dynamic Networks Based on Non-negative Matrix Factorization by Nahla Mohamed Ahmed, Ling Chen, Yulong Wang, Bin Li, Yun Li, Wei Liu

    Published 2018-03-01
    “…Finally, we demonstrate how latent NMF features can express network dynamics efficiently rather than by static representation, thereby yielding better performance. The amalgamation of time and structural information makes the method achieve prediction results that are more accurate. …”
    Get full text
    Article
  7. 247987

    Green Cosmetics to Environmental Sustainability by Lilik Purwanti, Eny Zuhrotin Nasyi’ah, Melinda Ibrahim, Aryo Prakoso

    Published 2024-06-01
    “…One form of implementation of CSR activities has been carried out by The Body Shop in Indonesia with the Bring Back Our Bottle (BBOB) CSR Program. …”
    Get full text
    Article
  8. 247988

    Polyfactoriality as a Defining Criterion of Formulaic Speech by Günter Schmale

    Published 2020-12-01
    “…This notion permits to take into account segmental, prosodic, corporal, contextual and situational elements in order to define an utterance or one of its units as being formulaic, even when it consists of one lexical item only. …”
    Get full text
    Article
  9. 247989

    PROFILING OF THE HOB TOOL FOR WORM SHAFTS DEFORMATION by VIRGIL GABRIEL TEODOR, GEORGIANA-ALEXANDRA MOROSANU, NICUSOR BAROIU, RAZVAN SEBASTIAN CRACIUN, VIOREL PAUNOIU

    Published 2023-02-01
    “…Two such tandem tools are used for deformation, the semi-finished product being positioned between them. During generation, the tools rotate around their own axes, which, combined with their helical surface, causes a helical movement of the blank. …”
    Get full text
    Article
  10. 247990

    Probabilistic Evaluation of Seismic Performance of Steel Buildings with Torsional Irregularities in Plan and Soft Story under Mainshock-Aftershock Sequence by Hamed Kouhestanian, Mohammad Hossein Razmkhah, Jalil Shafaei, Hossein Pahlavan, Mohammad Shamekhi Amiri

    Published 2023-01-01
    “…Furthermore, irregularities such as soft story and torsional irregularity may change the structural behavior under the influence of earthquakes. This study investigates the fragility curves associated with the three-, five-, and eight-story models with steel moment-resisting frames under the main earthquake and mainshock-aftershock sequence to probabilistically evaluate the aftershock impacts on the steel structures with irregularities in the plan and height. …”
    Get full text
    Article
  11. 247991

    Multiplicity results for asymmetric boundary value problems with indefinite weights by Francesca Dalbono

    Published 2004-01-01
    “…The proof is developed in the framework of topological methods and is based on some relations between rotation numbers and weighted eigenvalues.…”
    Get full text
    Article
  12. 247992

    A survey of cybersecurity for intelligent connected-automated vehicle by Yufeng LI, Xiaoyuan LU, Chenhong CAO, Jiangtao LI, Hongyi ZHU, Nan MENG

    Published 2020-04-01
    “…(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV.…”
    Get full text
    Article
  13. 247993

    A Taguchi-based study on the control factors of reinforced composites with the fiber of coir and pineapple leaves by Md Firoz Kabir, Md Alamgir Hossain, Md Nazmus Sakib, Md Waliullah Shadhin, Md Ariful Alam

    Published 2025-01-01
    “…The use of composite materials, whether metallic or non-metallic, is becoming more popular nowadays because of some of their superior characteristics compared to the use of wood and metallic materials alone. …”
    Get full text
    Article
  14. 247994

    A estrutura da rede das companhias aéreas brasileiras: concentração empresarial e centralização territorial by Ana Paula Camilo Pereira

    Published 2022-06-01
    “…The structure of the Brazilian aerial network has been configured in a concentrated and centralized way for decades. …”
    Get full text
    Article
  15. 247995

    THE REVIEW OF SNACK BAR FROM CHIA - MOCAF AS AN ANTIDIABETIC FOOD by Saskia Revinka Maharani, Vega Yoesepa Pamela, Septariawulan Kusumasari

    Published 2021-07-01
    “…The content mocaf flour in 100 grams are protein 1.2%, fat 0.4%, and 3.4% fiber. Chia seed flour has been shown to increase AMPK expression, while mocaf can increase insulin sensitivity in type 2 diabetes mellitus.…”
    Get full text
    Article
  16. 247996

    Code security of mobile backup modules on the Android platform by Jiao LIANG, Wu LIU, Wei-li HAN, Xiao-yang WANG, Si-yu GAN, Shuo SHEN

    Published 2017-01-01
    “…By studying how widely these backup services were being used in the Android applications, the differences of code security about four mainstream Android backup SDK were investigated. …”
    Get full text
    Article
  17. 247997

    Roots of Equivalence in Translation History Till The Current Times With Concentration on Arabic as an Example by Saad Alyamam Vafaıbaaj

    Published 2023-06-01
    “…Achieving equal value or equivalence between the source text (ST) and the target text (TT) is the key aim of every translation attempt. …”
    Get full text
    Article
  18. 247998

    Diet, Physical Activity, Weight Status, and Culture in a Sample of Children from the Developing World by Pamela S. Gaskin, Pamela Lai, Devon Guy, JaDon Knight, Maria Jackson, Anders L. Nielsen

    Published 2012-01-01
    “…Results. Sugar-sweetened beverages provided 21% of energy consumed. Energy intake significantly explained BMI. …”
    Get full text
    Article
  19. 247999

    An Extended Newmark-FDTD Method for Complex Dispersive Media by Yu-Qiang Zhang, Peng-Ju Yang

    Published 2018-01-01
    “…In this paper, the time-stepping equation of the polarization vector is derived by applying simultaneously the Newmark algorithm to the two sides of a second-order time-domain differential equation obtained from the relation between the polarization vector and electric field intensity in the frequency domain by the inverse Fourier transform. …”
    Get full text
    Article
  20. 248000

    Water Hammer Modelling and Simulation by GIS by K. Hariri Asli, A. K. Haghi, H. Hariri Asli, E. Sabermaash Eshghi

    Published 2012-01-01
    “…This work defined an Eulerian-based computational model compared with regression of the relationship between the dependent and independent variables for water hammer surge wave in transmission pipeline. …”
    Get full text
    Article