Showing 2,001 - 2,020 results of 18,544 for search 'thumri~', query time: 5.76s Refine Results
  1. 2001
  2. 2002
  3. 2003

    Optimization of Extraction of Compound Flavonoids from Chinese Herbal Medicines Based on Quantification Theory and Evaluation of Their Antioxidant Activity by Xu Yang, Dongli Cao, Haiyu Ji, Yingying Feng, Juan Yu, Anjun Liu

    Published 2022-01-01
    “…L9 (34) orthogonal design, level effect and engineering average estimation, and quantification theory were utilized to improve the extraction method of CFs, and the predictive model for CFs yield was constructed. …”
    Get full text
    Article
  4. 2004

    On the Vibration Analysis of Rotating Piezoelectric Functionally Graded Beams Resting on Elastic Foundation with a Higher-Order Theory by Pham Minh Phuc, Vu Nguyen Thanh

    Published 2022-01-01
    “…The present theory eliminates the necessity for shear correction factors while precisely describing the structure’s mechanical response. …”
    Get full text
    Article
  5. 2005

    An evolutionary game theory analysis on the environmental impact of discharging Fukushima's nuclear wastewater: International stakeholders and strategic dynamics. by Mingyang Li, Han Pengsihua, Songqing Zhao, Zejun Wang, Limin Yang, Tongjing Liu

    Published 2025-01-01
    “…This study employs a mixed-method approach, integrating quantitative evolutionary game theory and qualitative data analysis to explore the strategic dynamics among Japan, other nations, and the Japan Fisheries Association regarding this decision. …”
    Get full text
    Article
  6. 2006

    College students’ entrepreneurship education path and management strategy of start-up enterprises using causal attribution theory by Qingquan Liu, Xuewei An, Wei Chen

    Published 2025-01-01
    “…Finally, drawing on the causal attribution theory, the influencing factors and entrepreneurial risks of college students’ entrepreneurship are analyzed. …”
    Get full text
    Article
  7. 2007
  8. 2008

    Antigenic Complementarity in the Origins of Autoimmunity: A General Theory Illustrated With a Case Study of Idiopathic Thrombocytopenia Purpura by Robert Root-Bernstein, Jacob Couturier

    Published 2006-01-01
    “…We describe a novel, testable theory of autoimmunity, outline novel predictions made by the theory, and illustrate its application to unravelling the possible causes of idiopathic thrombocytopenia purpura (ITP). …”
    Get full text
    Article
  9. 2009
  10. 2010

    A Novel Wide-Area Backup Protection Based on Fault Component Current Distribution and Improved Evidence Theory by Zhe Zhang, Xiangping Kong, Xianggen Yin, Zengli Yang, Lijun Wang

    Published 2014-01-01
    “…After that, the master substation will identify the actual faulty line with improved D-S evidence theory based on the action states of traditional protections and direction components of these suspicious faulty lines. …”
    Get full text
    Article
  11. 2011

    Dual-channel near-field holographic MIMO communications based on programmable digital coding metasurface and electromagnetic theory by Rui Wen Shao, Jun Wei Wu, Jiachen Li, Shengguo Meng, Yifan Xu, Zheng Xing Wang, Wankai Tang, Qiang Cheng, Shi Jin, Tie Jun Cui

    Published 2025-01-01
    “…Here, we propose a near-field holographic MIMO communication architecture based on programmable digital coding metasurface (PDCM) and electromagnetic theory. The orthogonal holographic patterns on the transmitting and receiving apertures are firstly obtained using the Hilbert-Schmidt decomposition of the radiation operator. …”
    Get full text
    Article
  12. 2012
  13. 2013

    Acupuncture Modulates Disrupted Whole-Brain Network after Ischemic Stroke: Evidence Based on Graph Theory Analysis by Xiao Han, He Jin, Kuangshi Li, Yanzhe Ning, Lan Jiang, Pei Chen, Hongwei Liu, Yong Zhang, Hua Zhang, Zhongjian Tan, Fangyuan Cui, Yi Ren, Lijun Bai, Yihuai Zou

    Published 2020-01-01
    “…We gathered the functional magnetic resonance imaging (fMRI) from patients with stroke and healthy controls in the resting state and after acupuncture intervention, to investigate the instant alterations of the large-scale functional networks. The graph theory analysis was applied using the GRETNA and SPM12 software to construct the whole-brain network and yield the small-world parameters and network efficiency. …”
    Get full text
    Article
  14. 2014
  15. 2015
  16. 2016

    LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory by Fusheng Wu, Jinhui Liu, Yanbin Li, Mingtao Ni

    Published 2024-01-01
    “…The π-calculus is a basic theory of mobile communication based on the notion of interaction, which, is aimed at analyzing and modeling the behaviors of communication processes in communicating and mobile systems, and is widely applied to the security analysis of cryptographic protocol’s design and implementation. …”
    Get full text
    Article
  17. 2017

    On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory by Mohammad Abobala, Hasan Sankari, Mohamed Zeina

    Published 2024-03-01
    “…Many famous public key crypto-schemes use the basics of number theory to share keys and decrypt and encrypt messages and multimedia. …”
    Get full text
    Article
  18. 2018
  19. 2019
  20. 2020