-
101
VECTOR ELECTROCARDIOGRAPHY IN THE DIAGNOSTICS OF FOCAL CHANGES IN THE MYOCARDIUM
Published 2015-04-01“…Vector electrocardiography, allows us to investigate the periodic distribution of the electromotive force in dynamics over the entire surface of the heart, and also makes it possible to obtain detailed information about the functional state of the myocardium, specifying the depth and extent of the pathological process.…”
Get full text
Article -
102
Combination of dynamic and kinematic vector perturbations of beams
Published 2022-11-01“…Considered non-periodic, periodic and harmonic oscillations of the beams from vector perturbations. Examples of solutions for various conditions bearings beams.Conclusion. …”
Get full text
Article -
103
-
104
THE SOCIAL PROTEST «WITH CHINESE PARTICULARITY»: THE SHIFTING VECTOR
Published 2015-08-01Get full text
Article -
105
Individual’s Dominants as Vector of Language Interpretation of Quantity
Published 2019-05-01Get full text
Article -
106
-
107
Backstepping vector control strategy for MMC-RPC
Published 2022-01-01“…Secondly, the principle and design process of the backstepping vector control strategy were discussed in detail. …”
Get full text
Article -
108
-
109
An Intelligent Sample Selection Method for Space-Time Adaptive Processing in Heterogeneous Environment
Published 2019-01-01Subjects: “…Space-time adaptive processing (STAP)…”
Get full text
Article -
110
SOCIALIZATION OF ADOLESCENTS IN THE CONTEXT OF THEORY OF SPACE & TIME DYNAMICS OF SOCIALIZATION PROCESS
Published 2022-05-01“…The author also defines the terms of the path and the vector for socialization process.…”
Get full text
Article -
111
Multivector Nature of the Eurаsian Integration Process
Published 2018-04-01Subjects: Get full text
Article -
112
A novel data processing approach to detect fraudulent insurance claims for physical damage to cars
Published 2022-08-01Subjects: Get full text
Article -
113
-
114
Adapting Next-Generation Sequencing to <i>in Process</i> CRISPR-Cas9 Genome Editing of Recombinant <i>Ac</i>MNPV Vectors: From Shotgun to Tiled-Amplicon Sequencing
Published 2025-03-01“…The alphabaculovirus <i>Autographa californica</i> multiple nucleopolyhedrovirus (<i>Ac</i>MNPV) is the most commonly used virus in the Baculovirus Expression Vector System (BEVS) and has been utilized for the production of many human and veterinary biologics. …”
Get full text
Article -
115
Adaptive Motion Vector Resolutions in Raw Plenoptic Video Coding
Published 2025-01-01Get full text
Article -
116
Modern Vectors of Russian Diplomacy in the Post-Soviet Space
Published 2021-11-01Get full text
Article -
117
TreeVector: scalable, interactive, phylogenetic trees for the web.
Published 2010-01-01“…TreeVector is designed as a framework to integrate with these processes and produce user-customized phylogenies automatically. …”
Get full text
Article -
118
Secure distributed signcryption scheme based on vector space
Published 2009-01-01“…A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ends of both threshold signature and threshold encryption simultaneously, however, its cost was equal to threshold signature only.Furthermore, based on the discrete logarithm, properties were verified and structured, the legitimacy of the participators could be confirmed during the processes of the keys generation, distributed signcryption and distributed unsigncryption, which prevented the participators cheating.…”
Get full text
Article -
119
Secure distributed signcryption scheme based on vector space
Published 2009-01-01“…A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ends of both threshold signature and threshold encryption simultaneously, however, its cost was equal to threshold signature only.Furthermore, based on the discrete logarithm, properties were verified and structured, the legitimacy of the participators could be confirmed during the processes of the keys generation, distributed signcryption and distributed unsigncryption, which prevented the participators cheating.…”
Get full text
Article -
120