Suggested Topics within your search.
Suggested Topics within your search.
- History and criticism 7
- Politics and government 7
- Constitutional law 6
- History 6
- Law 6
- Methodology 6
- Economic conditions 5
- Mass media 5
- Swahili language 5
- English language 4
- Management 4
- Philosophy 4
- Research 4
- Study and teaching 4
- Women 4
- kiswahili 4
- kiswahili language 4
- Economic development 3
- Economic policy 3
- Evaluation 3
- Information technology 3
- Interpretation and construction 3
- Moral and ethical aspects 3
- Public administration 3
- Administration 2
- Agriculture 2
- Application software 2
- Appreciation 2
- Automobiles 2
- Children 2
-
2241
Modeling and Controller Design of a Magnetic-geared Double Rotor Motor
Published 2018-01-01“…The magnetic-geared double-rotor permanent magnet motor is fused permanent magnet brushless DC motor and field modulated magnetic gear,which is a kind of low speed and high torque direct drive motor. It has opened up a new idea for improving the motor efficiency and torque density. …”
Get full text
Article -
2242
Application of Compressive Sensing in Solving Monostatic Scattering Problems
Published 2019-01-01“…A new set of incident sources has been generated according to CS. By solving the matrix equations under the new set of incident sources and calculating the related far zone scattered fields, the measurements of the aforementioned signal can be derived. …”
Get full text
Article -
2243
Evaluation of Scheduling Schemes for Ecological Water Supplement of Rivers in Guangdong-Hong Kong-Macao Greater Bay Area Based on MIKE 11
Published 2024-07-01“…The evaluation results can provide a scientific basis for the water environment and quality improvement schemes of the Yachong River.…”
Get full text
Article -
2244
The Crosstalk between Myeloid Derived Suppressor Cells and Immune Cells: To Establish Immune Tolerance in Transplantation
Published 2016-01-01“…Myeloid derived suppressor cells (MDSCs) are a heterogeneous population of myeloid precursor and progenitor cells and endowed with a robust immunosuppressive activity in multiple pathophysiological conditions. Recent studies have uncovered the crosstalk between MDSCs and immune cells (i.e., natural killer cells, dendritic cells, macrophages, natural killer T cells, and regulatory T cells) and its role in the establishment and maintenance of immune tolerant microenvironment in transplantation. …”
Get full text
Article -
2245
Caesalpinia sappan L. ethyl acetate extract regulated angiogenesis in atherosclerosis by modulating the miR-126/VEGF signalling pathway
Published 2025-02-01“…Dual luciferase reporter gene assay results showed that miR-126 and VEGF have a targeting relationship, and the miR-126 mimic could inhibit the luciferase activity of the wild-type VEGF reporter gene vector (p value < 0.01). …”
Get full text
Article -
2246
Optimization Analysis of Mechanical Properties of Fly Ash-Based Multicontent Gasification Slag Paste Filling Material
Published 2022-01-01“…It is found that before proportioning, coal gangue of 2.5∼5 mm accounts for 80.8%, furnace bottom slag of less than 2.5 mm accounts for 56.5%, fly ash of 20∼80% μm accounts for 80%, and fly ash of 10∼20% μm accounts for 90%. …”
Get full text
Article -
2247
An Experimental Study on the Creep Characteristics of Sandstone in the Interval of Different Critical Stresses
Published 2021-01-01“…In addition, the value of σcd was very close to the long-term strength obtained by the method of the isochronous stress-strain curve. Therefore, σcd can be regarded as the long-term strength of the sandstone specimens. …”
Get full text
Article -
2248
Trustworthy component model supporting networks reconfiguration
Published 2013-03-01“…The results show that this model can change the topology of components and find out the hostility components, which improve the trustworthy of reconfigurable flexible network node.…”
Get full text
Article -
2249
Maximum Mutual Information Feature Extraction Method Based on the Cloud Platform
Published 2013-10-01“…With the large-scale application of gene chip,gene expression data with high dimension which exists a large number of irrelevant and redundant features may reduce classifier performance problem.A maximum mutual information feature extraction method based on cloud platforms was proposed.Hadoop cloud computing platform could be a parallel computing after gene expression data segmentation,features was extracted at the same time combined with the maximum mutual information method and the characteristics of cloud computing platform filter model was realized.Simulation experiments show that the maximum mutual information feature extraction method based on the cloud platform can rapid extraction of features in a higher classification accuracy which save a lot of time resources to make a highly efficient gene feature extraction system.…”
Get full text
Article -
2250
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
2251
Estimating Risk of Natural Gas Portfolios by Using GARCH-EVT-Copula Model
Published 2015-01-01“…Finally, we simulate N portfolios and estimate value at risk (VaR) and conditional value at risk (CVaR). Our empirical results show that, for an equally weighted portfolio of five natural gases, the VaR and CVaR values obtained from the Student t-copula are larger than those obtained from the Gaussian copula. …”
Get full text
Article -
2252
Primary Malignant Melanoma of the Genitourinary Tract with Upper and Lower Tracts Involvement
Published 2013-01-01Get full text
Article -
2253
The R&D of HTR-STAC Program Package: Source Term Analysis Codes for Pebble-Bed High-Temperature Gas-Cooled Reactor
Published 2018-01-01“…To solve this problem, HTR-PM Source Term Analysis Code (HTR-STAC) has been developed and related V&V has been finished. …”
Get full text
Article -
2254
The Immune Landscape and Its Potential for Immunotherapy in Advanced Biliary Tract Cancer
Published 2024-12-01“…The addition of immune checkpoint inhibitors (ICI) to chemotherapy have shown only a marginal benefit over chemotherapy alone due to the complex tumour immune microenvironment of these cancers. …”
Get full text
Article -
2255
Analysis of the Seismic Demand of High-Performance Buckling-Restrained Braces under a Strong Earthquake and Its Aftershocks
Published 2019-01-01“…The probabilistic seismic demand curves (PSDCs) for the ductility and CPD demand for the HPBRB under the strong earthquake and its aftershocks are obtained in combining the probabilistic seismic hazard analysis. …”
Get full text
Article -
2256
-
2257
-
2258
Classified risk assessment method of Android application based on multi-factor clustering selection
Published 2021-04-01“…Most existing risk assessments of Android applications directly assign weights to factors according to experience, and calculate security risks by counting the frequency statistics of few factors.A new method for risk assessment of Android applications is proposed, which can provide both quantitative and qualitative assessment.This method integrates multiple risk factors such as system permissions, API calls, the action properties of Intent Filter, and data flow.The risks of factors are assigned based on their risk classification and addition, and the weights of factor subsets are distributed based on hierarchical clustering.Experiments show that the assessment results can effectively reflect the real security risks of Android applications.…”
Get full text
Article -
2259
Equivalent Substitution of Stress Balanced Tooth Profile based on Eccentricity Modification
Published 2018-01-01“…It is determined that this equivalent stress equalization tooth profile can replace the stress equalization tooth profile.…”
Get full text
Article -
2260
Cooperative caching algorithm of UAV and user in UAV-assisted cellular network
Published 2020-09-01Subjects: Get full text
Article