Suggested Topics within your search.
Suggested Topics within your search.
- History and criticism 7
- Politics and government 7
- Constitutional law 6
- History 6
- Law 6
- Methodology 6
- Economic conditions 5
- Mass media 5
- Swahili language 5
- English language 4
- Management 4
- Philosophy 4
- Research 4
- Study and teaching 4
- Women 4
- kiswahili 4
- kiswahili language 4
- Economic development 3
- Economic policy 3
- Evaluation 3
- Information technology 3
- Interpretation and construction 3
- Moral and ethical aspects 3
- Public administration 3
- Administration 2
- Agriculture 2
- Application software 2
- Appreciation 2
- Automobiles 2
- Children 2
-
2141
EFFECT OF WELDING RESIDUAL STRESS ON CRACK PROPAGATION AND FATIGUE PERFORMANCE OF HIGH STRENGTH STEEL SPOT WELDING JOINT
Published 2024-04-01“…By analvzing the variation curve of the local stress intensity factor at the deepest point of the crack with the crack depth ratio under the two conditions, the influence of residual stress of spot welding on the propagation of kinked crack was studied. …”
Get full text
Article -
2142
-
2143
Peroxisome Proliferator-Activated Receptor-γ-Mediated Polarization of Macrophages in Leishmania Infection
Published 2012-01-01“…Thus, Leishmania parasites harness PPARγ to increase infectivity.…”
Get full text
Article -
2144
Association of Human Lymphocyte Antigens with Obstructive Airways Disease after Bone Marrow Transplantation
Published 1996-01-01Get full text
Article -
2145
Trusted routing based on D-S evidence theory in wireless mesh network
Published 2011-01-01“…Combined with Dempster-Shafer(D-S) evidence theory,a trust evaluation model was given,meanwhile,a trusted routing——T-AODV was also proposed which built trusted routings according to the trustworthiness of nodes calculated by the proposed trust evaluation model.Simulation results show that the proposed scheme can detect and isolate malicious nodes efficiently and resist attacks to some extent and improve the reliability,robustness and security of the over all network effectively.…”
Get full text
Article -
2146
Trust based secure routing algorithm for wireless sensor networks
Published 2008-01-01“…Simulation experiments show that it can effectively resist the wormhole attack, which is lack of effective methods to re- sist at present.…”
Get full text
Article -
2147
Research on clock synchronization of ad hoc networks
Published 2006-01-01“…As the variety of ad hoc networks applications and synchronization requirements, none synchronization proto-col can fit all the conditions. Based on the analysis of the difficulty of networks clock synchronization, the particularity of clock synchronization protocols for different networks applications was discussed and the typical clock synchronization protocols proposed for these applications were introduced. …”
Get full text
Article -
2148
Seamless QoS-Enabled Handover Scheme Using CoMP in Fast Moving Vehicular Networks
Published 2013-12-01Get full text
Article -
2149
FINITE ELEMENT SIMULATION AND STRUCTURE OPTIMIZATION OF THE AGITATING MECHANISM OF DOUBLE SHAFT VIBRATING MIXER
Published 2020-01-01“…Analyze the force of the agitating mechanism of double shaft vibrating mixer under different working conditions.Combined with the finite element software analysis,the stress,strain and modal shape of the agitating mechanism is obtained.At the same time,the strain pattern is compared with the actual deformation zone to verify the rationality of the finite element analysis.An optimization scheme is proposed aiming at improving the stiffness.After the simulation analysis,the stiffness of the optimized agitating mechanism is obviously enhanced to meet the work requirements.Meanwhile,the strength and natural frequency of the mechanism have also improved.It has an important significance for reducing safety incidents.At the same time,it also lays a theoretical foundation for vertical shaft vibration mixing technology.…”
Get full text
Article -
2150
Shaping the future of commercial quantum computer and the challenge for information security
Published 2016-03-01“…The modern cryptography still has strong security. Take the quantum devices constraints into consideration was proposed for the first time, the storage of former registers in the Shor algorithm should be 100 or less Qubits theoretically decreased from 1 000 or more Qubits. …”
Get full text
Article -
2151
Clinical Profile and Visual Outcome of Ocular Bartonellosis in Malaysia
Published 2017-01-01“…The mean age was 29.3 years. The majority (63.2%) had unilateral involvement. Five patients (26.3%) had a history of contact with cats. …”
Get full text
Article -
2152
Current Iodine Nutrition Status and Awareness of Iodine Deficiency in Tuguegarao, Philippines
Published 2014-01-01“…Although 62.3% of students answered that they can list problems resulting from iodine deficiency, a majority of students (70.5%) were unable to identify problems other than goiter. …”
Get full text
Article -
2153
Element contents changes during the propagule development of two Sonneratia species
Published 2025-01-01“…As the propagules of S. alba and S. caseolaris mature, the element concentrations (mg/g) in the propagules gradually decrease, indicating a desalination process. Moreover, the Cl, Na, Ca, and Mg content in the propagules were lower than in the mature leaves and calyx. …”
Get full text
Article -
2154
Genomic epidemiology and phenotypic characterization of Staphylococcus aureus isolated from atopic dermatitis patients in South China
Published 2025-02-01“…ST188 exhibited high virulence and adhesion, possibly due to the cna gene. Phylogenetic and population structure analysis revealed that 579 strains of global AD were classified into 15 sequence clusters (SCs), with SC5, SC2, and SC7 dominating. …”
Get full text
Article -
2155
Perturbation Methods for the Eigencharacteristics of Symmetric and Asymmetric Systems
Published 2018-01-01“…However, when design changes are introduced, the eigensolutions of the system change and thus must be recomputed. …”
Get full text
Article -
2156
Biophysical aspects of mechanotransduction in cells and their physiological/biological implications in vocal fold vibration: a narrative review
Published 2025-01-01“…Conversely, studies using vocal fold mimetic bioreactors have demonstrated that mechanical stimulation of vocal fold fibroblasts can lead to highly heterogeneous responses, depending on the nature and parameters of the induced vibration. …”
Get full text
Article -
2157
Unsupervised machine and deep learning methods for structural damage detection: A comparative study
Published 2025-01-01“…Abstract While many structural damage detection methods have been developed in recent decades, few data‐driven methods in unsupervised learning mode have been developed to solve the practical difficulties in data acquisition for civil infrastructures in different scenarios. …”
Get full text
Article -
2158
Possibility of the Use of Public Microarray Database for Identifying Significant Genes Associated with Oral Squamous Cell Carcinoma
Published 2012-03-01“…From these selected genes, significant genetic pathways associated with expression changes were identified. By combining several datasets from the public database, sufficient samples can be obtained for detecting reliable information. …”
Get full text
Article -
2159
Effect of pre-conception serum vitamin D level on pregnancy outcomes in women undergoing in vitro fertilization with fresh embryo transfer: a retrospective analysis
Published 2025-01-01“…Results A total of 16/306 (5.3%) patients had hypertensive disorders of pregnancy (gestational hypertension and/or pre-eclampsia). …”
Get full text
Article -
2160
Increasing temporal stability of global tropical cyclone precipitation
Published 2025-01-01“…Abstract Tropical cyclone (TC) precipitation has led to escalating urban flooding and transportation disruptions in recent years. …”
Get full text
Article