Showing 64,421 - 64,440 results of 73,353 for search 'effective function', query time: 0.43s Refine Results
  1. 64421

    Resource presentation dictates genetic and phenotypic adaptation in yeast by Neetika Ahlawat, Anjali Mahilkar, Supreet Saini

    Published 2025-04-01
    “…However, despite different adaptive responses, pleiotropic effects of adaptation are largely predictable. We also show that distinct genomic targets of adaptation between the two sets of evolved populations are functionally convergent. …”
    Get full text
    Article
  2. 64422

    A new $ H_{\infty} $ control method of switched nonlinear systems with persistent dwell time: $ H_{\infty} $ fuzzy control criterion with convergence rate constraints by Han Geng, Huasheng Zhang

    Published 2024-09-01
    “…Subsequently, by combining the interval stability definition, T-S fuzzy model, PDT technique, and Lyapunov-Krasovskii (L-K) functional, a new $ H_{\infty} $ fuzzy control criterion for adjusting the convergence rate of switched nonlinear systems with time-varying delays is proposed. …”
    Get full text
    Article
  3. 64423

    Neutrosophic Logic for Secure Hand-Based Biometrics: Quantifying Privacy-Security Tradeoffs in Remote Authentication Systems by A. A. Salama, Abdelnasser Mohamed, Huda E. Khalid, Ahmed K. Essa, Doaa E. Mossa

    Published 2025-07-01
    “…To address this gap, we propose a vulnerability assessment framework grounded in neutrosophic logic [11], which evaluates system robustness through truth (T), indeterminacy (I), and falsity (F) membership functions, and this approach quantifies the trade-offs between security and privacy, revealing that hand-based biometrics achieve 92% security effectiveness (T = 0.8) while retaining an 18% uncertainty factor ( 𝐼 = 0.4 ) concerning potential vulnerabilities, and added analysis further identifies deficiencies in template protection (F = 0.2) and data transmission protocols, and we, proposed framework advances us the evaluation of biometric systems by using integrating neutrosophic uncertainty modeling, and it provides actionable insights for designing secure remote authentication architectures. …”
    Get full text
    Article
  4. 64424

    Enriched Milk Drinks for Vitamin Deficiency Correction in Toddlers and Preschoolers by Vera M. Kodentsova

    Published 2017-06-01
    “…Inclusion of milk drinks in the general diet guarantees adequate consumption of micronutrients, provides the body with vitamins and microelements, reduces disease incidence, improves cognitive functions of children.…”
    Get full text
    Article
  5. 64425

    Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model by Horkaew et al.

    Published 2020-03-01
    “…Human face is a viable biometric that could be effectively used in both identification and verification. …”
    Get full text
    Article
  6. 64426

    Inhibition of Migration of SW-480 Cells Induced by Royal Jelly Due to Reduction of β-Catenin by Milena Jovanović, Dragana Šeklić

    Published 2024-12-01
    “…These findings underscore the potential of RJ as a functional food to regulate colorectal cancer cell motility through modulation of β-catenin, thereby reducing disease aggressiveness.…”
    Get full text
    Article
  7. 64427

    The role of amensalism and parasitism on the dynamics of three species ecological system by Alyaa Raad Saleh Abd Alhadi, Raid Kamel Naji

    Published 2025-06-01
    “…The global stability was examined using Lyapunov functions. Every prerequisite for perseverance was identified. …”
    Get full text
    Article
  8. 64428

    SecuNet 4D a comprehensive framework for distributed SDN security and resilience by Sumit Badotra, Mohan Gurusamy

    Published 2025-05-01
    “…Furthermore, the proposed framework presents flexible and scalable security solutions capable of accommodating various network sizes and functioning effectively for both small networks (<16 users) and large networks (>2000 users). …”
    Get full text
    Article
  9. 64429

    Digital Transformation of Business Analytical Processes by O. E. Mikhnenko

    Published 2021-04-01
    “…With regard to the requirements of management, the article analyzes the behavior of elements of the internal business environment to develop a management solution to improve the effectiveness of their behavior. The high quality of the solution is provided by the information model being a highly adequate image of a particular object under control and the ability of the control apparatus to fully realize the volume of its inherent functions. …”
    Get full text
    Article
  10. 64430

    An island flap based on the anterior branch of the superficial temporal artery for perioral defects by Bhattacharya V, Reddy Ganji, Bashir Sheikh, Goyal Sunish

    Published 2006-01-01
    “…The functional and aesthetic results are gratifying with minimal donor site morbidity.…”
    Get full text
    Article
  11. 64431
  12. 64432

    Sensitivity Analysis of E-B model for Axial Zoned Concrete-Faced Rockfill Dam by WANG Yazhong, LIANG Qinzheng, WANG Dong, ZHOU Zeze, YU Yuhong, LIU Xiang

    Published 2025-03-01
    “…Through the filling of different modulus materials, the three-dimensional deformation of the dam shell can be reduced, and the extruding rupture of high CFRD and even ultra-high CFRD can be improved. Its mechanism and effect are different from those of traditional transverse two-dimensional zoned CFRD. …”
    Get full text
    Article
  13. 64433

    Cluster approach in tourism development: spatial aspect by N. S. Beskorovainaia, D. A. Panchenko

    Published 2024-06-01
    “…The field of economic relationships of cluster subjects is beyond its scope, which explains the gap between the actual and desired effect of its functioning. Nevertheless, the state must support tourism clusters, thus providing the basis for the future development of the region. …”
    Get full text
    Article
  14. 64434

    Therapy of patients with osteoarthritis with low energy laser radiation by L. V. Vasiljeva, LA Starodubtsevu, N A Barsukova

    Published 2008-06-01
    “…Inclusion criteria: unsatisfactory effect of previous drug therapy (DT), stable NSAID dose 3-5 days before and during LELR course, absence of comorbid hepatic and kidney diseases in stage of functional decompensation, malignant diseases, exclusion therapy influencing microcirculation, exercise therapy, physical therapy. …”
    Get full text
    Article
  15. 64435

    The role of epistemic trust and epistemic disruption in vaccine hesitancy, conspiracy thinking and the capacity to identify fake news. by Michal Tanzer, Chloe Campbell, Rob Saunders, Thomas Booker, Patrick Luyten, Peter Fonagy

    Published 2024-01-01
    “…The work described here sought to investigate how the vulnerability engendered by disruptions in epistemic trust may not only impact psychological resilience and interpersonal processes but also aspects of more general social functioning. We undertook two studies to examine the role of epistemic trust in determining capacity to recognise fake/real news, and susceptibility to conspiracy thinking-both in general and in relation to COVID-19. …”
    Get full text
    Article
  16. 64436

    The impact of natural ventilation on the adaptive reuse of a Taiwanese heritage house: an analysis using anemometers and CFD by Dany Perwita Sari, Yun Shang Chiou, William Sugianto

    Published 2025-05-01
    “…Traditional houses have the advantage of being able to adapt to their surroundings effectively. Several traditional houses are listed as local heritage in Taiwan’s Guanshan village. …”
    Get full text
    Article
  17. 64437

    Volumetric Denoising of XCT Data Using Quantum Computing by Thomas Lang, Anja Heim, Anastasia Papadaki, Kilian Dremel, Dimitri Prjamkov, Martin Blaimer, Markus Firsching, Stefan Kasperl, Theobald O.J. Fuchs

    Published 2025-02-01
    “…However, the latter is subject to physical effects that primarily include artifacts and quantum noise. …”
    Get full text
    Article
  18. 64438

    Stochastic Multiple Chaotic Local Search-Incorporated Gradient-Based Optimizer by Hang Yu, Yu Zhang, Pengxing Cai, Junyan Yi, Sheng Li, Shi Wang

    Published 2021-01-01
    “…In this study, CGBO is tested with over 30 CEC2017 benchmark functions and a parameter optimization problem of the dendritic neuron model (DNM). …”
    Get full text
    Article
  19. 64439

    Multi-criteria routing metric for supporting data-differentiated service in hybrid wireless mesh networks in coal mines by Liansheng Lu, Haifeng Jiang, Guangzhi Han, Shanshan Ma, Renke Sun

    Published 2017-01-01
    “…Mesh clients in hybrid wireless mesh networks can perform the routing functionality, as well as provide end-user applications that are more suitable for tunnels, to improve the connectivity of backbone networks. …”
    Get full text
    Article
  20. 64440

    Varying Levels of Trust across Multi-Level Governance: A Sustainability Perspective by Zsuzsanna Pálffy, Lívia Ablonczy-Mihályka

    Published 2024-12-01
    “…Social sustainability, the third pillar of sustainability alongside ecological and economic dimensions, focuses on maintaining the well-being and viability of communities, as a healthy functioning society is a prerequisite for sustainable operation. …”
    Get full text
    Article