Showing 2,241 - 2,260 results of 9,936 for search 'chav~', query time: 1.95s Refine Results
  1. 2241

    Modeling and Controller Design of a Magnetic-geared Double Rotor Motor by Cao Jiayong, Yao Chunzhe, Wang Jingsen, Ren Chao

    Published 2018-01-01
    “…The magnetic-geared double-rotor permanent magnet motor is fused permanent magnet brushless DC motor and field modulated magnetic gear,which is a kind of low speed and high torque direct drive motor. It has opened up a new idea for improving the motor efficiency and torque density. …”
    Get full text
    Article
  2. 2242

    Application of Compressive Sensing in Solving Monostatic Scattering Problems by Shui-Rong Chai, Li-Xin Guo, Long Li

    Published 2019-01-01
    “…A new set of incident sources has been generated according to CS. By solving the matrix equations under the new set of incident sources and calculating the related far zone scattered fields, the measurements of the aforementioned signal can be derived. …”
    Get full text
    Article
  3. 2243

    Evaluation of Scheduling Schemes for Ecological Water Supplement of Rivers in Guangdong-Hong Kong-Macao Greater Bay Area Based on MIKE 11 by GAO Huayong, ZHAO Bikui, GUO Xiaojuan, TAN Chao

    Published 2024-07-01
    “…The evaluation results can provide a scientific basis for the water environment and quality improvement schemes of the Yachong River.…”
    Get full text
    Article
  4. 2244

    The Crosstalk between Myeloid Derived Suppressor Cells and Immune Cells: To Establish Immune Tolerance in Transplantation by Chao Zhang, Shuo Wang, Cheng Yang, Ruiming Rong

    Published 2016-01-01
    “…Myeloid derived suppressor cells (MDSCs) are a heterogeneous population of myeloid precursor and progenitor cells and endowed with a robust immunosuppressive activity in multiple pathophysiological conditions. Recent studies have uncovered the crosstalk between MDSCs and immune cells (i.e., natural killer cells, dendritic cells, macrophages, natural killer T cells, and regulatory T cells) and its role in the establishment and maintenance of immune tolerant microenvironment in transplantation. …”
    Get full text
    Article
  5. 2245

    Caesalpinia sappan L. ethyl acetate extract regulated angiogenesis in atherosclerosis by modulating the miR-126/VEGF signalling pathway by Yue He, Chao Huang, Jingjing Chen, Weizeng Shen

    Published 2025-02-01
    “…Dual luciferase reporter gene assay results showed that miR-126 and VEGF have a targeting relationship, and the miR-126 mimic could inhibit the luciferase activity of the wild-type VEGF reporter gene vector (p value < 0.01). …”
    Get full text
    Article
  6. 2246

    Optimization Analysis of Mechanical Properties of Fly Ash-Based Multicontent Gasification Slag Paste Filling Material by Denghong Chen, Tianwei Cao, Ran Chen, Chao Li

    Published 2022-01-01
    “…It is found that before proportioning, coal gangue of 2.5∼5 mm accounts for 80.8%, furnace bottom slag of less than 2.5 mm accounts for 56.5%, fly ash of 20∼80% μm accounts for 80%, and fly ash of 10∼20% μm accounts for 90%. …”
    Get full text
    Article
  7. 2247

    An Experimental Study on the Creep Characteristics of Sandstone in the Interval of Different Critical Stresses by Chao Yang, Xingchen Dong, Xuan Xu, Qiancheng Sun

    Published 2021-01-01
    “…In addition, the value of σcd was very close to the long-term strength obtained by the method of the isochronous stress-strain curve. Therefore, σcd can be regarded as the long-term strength of the sandstone specimens. …”
    Get full text
    Article
  8. 2248

    Trustworthy component model supporting networks reconfiguration by Bo YUAN, Bin-qiang WANG, Dong-chao MA

    Published 2013-03-01
    “…The results show that this model can change the topology of components and find out the hostility components, which improve the trustworthy of reconfigurable flexible network node.…”
    Get full text
    Article
  9. 2249

    Maximum Mutual Information Feature Extraction Method Based on the Cloud Platform by Shasha Wei, Huijuan Lu, Wei Jin, Chao Li

    Published 2013-10-01
    “…With the large-scale application of gene chip,gene expression data with high dimension which exists a large number of irrelevant and redundant features may reduce classifier performance problem.A maximum mutual information feature extraction method based on cloud platforms was proposed.Hadoop cloud computing platform could be a parallel computing after gene expression data segmentation,features was extracted at the same time combined with the maximum mutual information method and the characteristics of cloud computing platform filter model was realized.Simulation experiments show that the maximum mutual information feature extraction method based on the cloud platform can rapid extraction of features in a higher classification accuracy which save a lot of time resources to make a highly efficient gene feature extraction system.…”
    Get full text
    Article
  10. 2250

    Lightweight security architecture design for wireless sensor network by Chao WANG, Guang-yue HU, Huan-guo ZHANG

    Published 2012-02-01
    “…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
    Get full text
    Article
  11. 2251

    Estimating Risk of Natural Gas Portfolios by Using GARCH-EVT-Copula Model by Jiechen Tang, Chao Zhou, Xinyu Yuan, Songsak Sriboonchitta

    Published 2015-01-01
    “…Finally, we simulate N portfolios and estimate value at risk (VaR) and conditional value at risk (CVaR). Our empirical results show that, for an equally weighted portfolio of five natural gases, the VaR and CVaR values obtained from the Student t-copula are larger than those obtained from the Gaussian copula. …”
    Get full text
    Article
  12. 2252
  13. 2253

    The R&D of HTR-STAC Program Package: Source Term Analysis Codes for Pebble-Bed High-Temperature Gas-Cooled Reactor by Hongyu Chen, Chuan Li, Haoyu Xing, Chao Fang

    Published 2018-01-01
    “…To solve this problem, HTR-PM Source Term Analysis Code (HTR-STAC) has been developed and related V&V has been finished. …”
    Get full text
    Article
  14. 2254

    The Immune Landscape and Its Potential for Immunotherapy in Advanced Biliary Tract Cancer by Andry Santoso, Iris Levink, Rille Pihlak, Ian Chau

    Published 2024-12-01
    “…The addition of immune checkpoint inhibitors (ICI) to chemotherapy have shown only a marginal benefit over chemotherapy alone due to the complex tumour immune microenvironment of these cancers. …”
    Get full text
    Article
  15. 2255

    Analysis of the Seismic Demand of High-Performance Buckling-Restrained Braces under a Strong Earthquake and Its Aftershocks by Luqi Xie, Jing Wu, Qing Huang, Chao Tong

    Published 2019-01-01
    “…The probabilistic seismic demand curves (PSDCs) for the ductility and CPD demand for the HPBRB under the strong earthquake and its aftershocks are obtained in combining the probabilistic seismic hazard analysis. …”
    Get full text
    Article
  16. 2256
  17. 2257
  18. 2258

    Classified risk assessment method of Android application based on multi-factor clustering selection by Fan CHAO, Zhi YANG, Xuehui DU, Bing HAN

    Published 2021-04-01
    “…Most existing risk assessments of Android applications directly assign weights to factors according to experience, and calculate security risks by counting the frequency statistics of few factors.A new method for risk assessment of Android applications is proposed, which can provide both quantitative and qualitative assessment.This method integrates multiple risk factors such as system permissions, API calls, the action properties of Intent Filter, and data flow.The risks of factors are assigned based on their risk classification and addition, and the weights of factor subsets are distributed based on hierarchical clustering.Experiments show that the assessment results can effectively reflect the real security risks of Android applications.…”
    Get full text
    Article
  19. 2259

    Equivalent Substitution of Stress Balanced Tooth Profile based on Eccentricity Modification by Xuan Liang, Jiang Heng, Guan Tianmin, Xie Chao

    Published 2018-01-01
    “…It is determined that this equivalent stress equalization tooth profile can replace the stress equalization tooth profile.…”
    Get full text
    Article
  20. 2260