Showing 7,841 - 7,860 results of 39,706 for search 'presented function', query time: 0.23s Refine Results
  1. 7841

    Multilevel access control for video database by Jin-bo XIONG, Zhi-qiang YAO, Jian-feng MA, Qi LI

    Published 2012-08-01
    “…In regards to the critical issues of classification protecting sensitive information of the data stored in video database,a multilevel access control model for the video database was proposed.A series of algorithms was designed and developed in the model where a method of distinguishing user identity and an algorithm to ensure good identity strength were presented.The result of them was then used as the input to user's security level membership function.The user's security level membership degree was subsequently acquired from the result of this function,and it is then,together with the security level membership degree of video data,used as input to the comparison function of security level membership degree in authorization rule.As a result,the multilevel access control can be implemented neatly through combining the result of the comparison function with time element.Compared with the existing access control models,the most outstanding characteristics of the proposed model are realizations of dynamic authorization and video data classification protection.…”
    Get full text
    Article
  2. 7842

    Learning Multi-Attribute Differential Graphs With Non-Convex Penalties by Jitendra K. Tugnait

    Published 2025-01-01
    “…Two proximal gradient descent methods are presented to optimize the objective function. Theoretical analysis establishing sufficient conditions for consistency in support recovery, convexity and estimation in high-dimensional settings is provided. …”
    Get full text
    Article
  3. 7843

    Deciphering the Enigma of Wave-Particle Duality by Mani Lal Bhaumik

    Published 2016-12-01
    “…The necessity of acquiring the wave function in its entirety for detection, as evinced by the appearance of collapse of the wave function, supports the paradigm of reality of the wave function described here. …”
    Get full text
    Article
  4. 7844

    Experimental Studies of Heat and Moisture Exchange in the Process of Convective Drying of Thin Wet Materials by A. I. Ol’shanskii, S. V. Zhernosek, A. M. Gusarov

    Published 2018-12-01
    “…New ways of experimental data processing by generalized complex variables that are characteristic of the drying process are presented. The authors presented the results of a study of heat and moisture exchange in the convective drying of thin flat moist capillary-porous materials. …”
    Get full text
    Article
  5. 7845

    STRATIFICATION OF NEPHROCEREBRAL AND CARDIOVASCULAR RISK IN CHRONIC GLOMERULONEPHRITIS (LITERATURE REVIEW) by I. T. Murkamilov, I. S. Sabirov, Zh. A. Murkamilova, V. V. Fomin, A. I. Sabirova, K. A. Aitbaev, B. Zh. Imanov, N. A. Redzhapova, F. A. Yusupov

    Published 2018-12-01
    “…The presented data on the role of endothelial dysfunction in impaired renal function, which contributes to the formation of atherosclerosis, and the increase in the severity of the atherosclerotic process contributes to an increase in the sever ity of renal failure. …”
    Get full text
    Article
  6. 7846

    SYNTHESIS OF QUASI BAND LADDER TRANSFORMING HIGH ORDER FILTERS by A. E. Kurochkin

    Published 2019-12-01
    “…The purpose of the work, the results of which are presented in the article, was to develop a computerized mathematical model of the ladder filter to study the features of the synthesis of matching chains of any order on its basis. …”
    Get full text
    Article
  7. 7847

    Publishing houses and publishing organizations in Siberia and the Far East as popularizers of the historical and cultural heritage of the region by I. S. Troyak

    Published 2020-04-01
    “…The purpose of the study presented in the article is to reveal ways to implement the memorial function of the regional book culture in Siberia and the Far East in the 2000–2010s. …”
    Get full text
    Article
  8. 7848

    Solution of electromagnetic inverse problem of inhomogeneity reconstruction in dielectric body by near-field measurements using two-step method by Yury G. Smirnov, Andrey O. Lapich

    Published 2025-04-01
    “…The method of solving the inverse problem is a two-step one for determining the inhomogeneity of a body, which consists in first finding the current function inside the body, and then calculating the permittivity function. …”
    Get full text
    Article
  9. 7849

    Three new DC-to-DC Single-Switch Converters by Barry W. Williams, Mona Fouad Moussa

    Published 2017-06-01
    “…<p>This paper presents a new family of three previously unidentified dc-to-dc converters, buck, boost, and buck-boost voltage-transfer-function topologies, which offer advantageous transformer coupling features and low capacitor dc voltage stressing. …”
    Get full text
    Article
  10. 7850

    BVP with a Load in the Form of a Fractional Integral by Minzilya Kosmakova, Danna Akhmanova, Kamila Izhanova

    Published 2024-01-01
    “…By inverting the differential part, the problem is reduced to an integral equation with a kernel with a special function. The special function is presented as a generalized hypergeometric function. …”
    Get full text
    Article
  11. 7851

    Stackelberg games-based distributed algorithm of pricing and resource allocation in heterogeneous wireless networks by Yong JIANG, Shan-zhi CHEN, Bo HU

    Published 2013-01-01
    “…To deal with resource allocation in heterogeneous wireless networks,an algorithm based on multi-leader multi-follower Stackelberg games model was proposed to satisfy optimal utility of both operators and mobile users.The mobile user’s utility function with payoff and cost was designed,and it was demonstrated that the utility function obey concave function condition after defining operator price strategy,which assured the existence of Nash equilibrium point.A distributed iterative algorithm was presented to obtain optimal strategies of mobile user’s bandwidth allocation and operator’s pricing.At last,simulation experiments acquire player’s optimal strategies and Subgame perfect Nash equilibrium.…”
    Get full text
    Article
  12. 7852

    Postsurgical Orthodontic Treatment Planning: a Case Report with 20 Years Follow-up by Giampietro Farronato, Umberto Garagiola, Vera Carletti, Paolo Cressoni, Carmen Mortellaro

    Published 2011-04-01
    “…The long-term results confirmed the efficacy of the treatment protocol presented here from both functional and aesthetical perspectives.Conclusions: Postsurgical orthodontic treatment is an important step in the surgical and orthodontic therapy of maxillofacial deformities.…”
    Get full text
    Article
  13. 7853

    A Bayesian inference with Hamiltonian Monte Carlo (HMC) framework for a three-parameter model with reliability applications

    Published 2025-04-01
    “…Moreover, comprehensive reliability characteristics of the proposed model were derived and studied, such as the reliability function, failure rate function, mean residual life, and rth moments. …”
    Get full text
    Article
  14. 7854

    A study of the underwater acoustic disturbances produced by a ship propeller by Eugeniusz KOZACZKA

    Published 2016-03-01
    “…The results of the investigations carried out in a hydrodynamic channel are presented. They refer to the following characteristics: the amplitude spectrum of the disturbances, the propeller performance (characteristic), and the acoustic pressure level as a function of the propeller speed at given velocities of movement relative to the undisturbed water. …”
    Get full text
    Article
  15. 7855

    NEW METHODS OF ASSESSMENT OF SUBCLINICAL CHANGES IN THE CARDIOVASCULAR SYSTEM IN ARTERIAL HYPERTENSION by Zh. D. Kobalava, Yu. V. Kotovskaya, A. V. Bogomaz

    Published 2016-06-01
    “…The heart is related with vascular system anatomically and functionally. Structural and functional changes in the arterial bed increase afterload on the left ventricle (LV), and can change its function, leading to the restructuring of the LV adaptation. …”
    Get full text
    Article
  16. 7856

    Boundary Criteria for the Stability of Delay Differential-Algebraic Equations by Leping Sun, Yuhao Cong

    Published 2015-01-01
    “…Two stability criteria described by evaluating a corresponding harmonic analytical function on the boundary of a certain region are presented. …”
    Get full text
    Article
  17. 7857

    齿轮传动多模式失效的时变可靠性分析 by 王明清, 陈作越

    Published 2011-01-01
    “…A model of time-variant reliability and its computation method of gear drive under multi-failure mode are presented.The time-variant model of gear strength is created by using the relationships curve between the gear fatigue lifecoefficient and the number of stress cycle.And then the reliability analysis model of gear drive is presented,in which the contact fatigue failure and blend fatigue failure are taken into account.The time-variant probabilistic formula of the contact fatigue failure and blend fatigue failure is derived by using the first order second moment method.The analytic formula of the joint failure probability density function of the two fatigue modes is derived.A numerical example is given to illustrate the presented method.…”
    Get full text
    Article
  18. 7858

    Advanced Iterative Procedures for Solving the Implicit Colebrook Equation for Fluid Flow Friction by Pavel Praks, Dejan Brkić

    Published 2018-01-01
    “…The simple fixed-point method does not require derivatives of the Colebrook function, while the most of the other presented methods in this paper do require. …”
    Get full text
    Article
  19. 7859

    Modeling the Public Transport Networks: A Study of Their Efficiency by Mary Luz Mouronte-López

    Published 2021-01-01
    “…In modeling, the response variable was described by a binomial probability density function, and the logit function was used as a link function. …”
    Get full text
    Article
  20. 7860

    Study on modern malware analysis system by Yi ZHAO, Jian GONG, Wang YANG

    Published 2014-10-01
    “…The analysis of malicious code’s network behavior is an important research field of network security.This function of existed systems is incomplete and not deep.The functions of malicious code are summarized and a comprehensive content is presented.Moreover the network behavior analysis function of existed analysis systems is introduced and CUCKOO which is able to satisfy the requirements of involved study is found.Finally the advantage and points of this application platform were summarized,and an expansion of the system was proposed.…”
    Get full text
    Article