Search alternatives:
vector » sector (Expand Search)
processes » process (Expand Search)
Showing 101 - 120 results of 4,440 for search 'Vector processes', query time: 0.17s Refine Results
  1. 101

    VECTOR ELECTROCARDIOGRAPHY IN THE DIAGNOSTICS OF FOCAL CHANGES IN THE MYOCARDIUM by I. Ye. Belaya, V. I. Kolomiets, G. Ye. Vislouh

    Published 2015-04-01
    “…Vector electrocardiography, allows us to investigate the periodic distribution of the electromotive force in dynamics over the entire surface of the heart, and also makes it possible to obtain detailed information about the functional state of the myocardium, specifying the depth and extent of the pathological process.…”
    Get full text
    Article
  2. 102

    Combination of dynamic and kinematic vector perturbations of beams by A. M. Kaziev, Z. R. Likhov, A. Ya. Dzhankulaev, I. Yu. Kumyshev, G. A. Shigalugov

    Published 2022-11-01
    “…Considered non-periodic, periodic and harmonic oscillations of the beams from vector perturbations. Examples of solutions for various conditions bearings beams.Conclusion. …”
    Get full text
    Article
  3. 103
  4. 104
  5. 105
  6. 106
  7. 107

    Backstepping vector control strategy for MMC-RPC by SONG Pinggang, LONG Riqi, YANG Changlan, LEI Wenqi, ZHENG Yazhi

    Published 2022-01-01
    “…Secondly, the principle and design process of the backstepping vector control strategy were discussed in detail. …”
    Get full text
    Article
  8. 108
  9. 109
  10. 110

    SOCIALIZATION OF ADOLESCENTS IN THE CONTEXT OF THEORY OF SPACE & TIME DYNAMICS OF SOCIALIZATION PROCESS by Darya V. Galkina

    Published 2022-05-01
    “…The author also defines the terms of the path and the vector for socialization process.…”
    Get full text
    Article
  11. 111
  12. 112
  13. 113
  14. 114

    Adapting Next-Generation Sequencing to <i>in Process</i> CRISPR-Cas9 Genome Editing of Recombinant <i>Ac</i>MNPV Vectors: From Shotgun to Tiled-Amplicon Sequencing by Madhuja Chakraborty, Lisa Nielsen, Delaney Nash, Jozef I. Nissimov, Trevor C. Charles, Marc G. Aucoin

    Published 2025-03-01
    “…The alphabaculovirus <i>Autographa californica</i> multiple nucleopolyhedrovirus (<i>Ac</i>MNPV) is the most commonly used virus in the Baculovirus Expression Vector System (BEVS) and has been utilized for the production of many human and veterinary biologics. …”
    Get full text
    Article
  15. 115
  16. 116
  17. 117

    TreeVector: scalable, interactive, phylogenetic trees for the web. by Ralph Pethica, Gary Barker, Tim Kovacs, Julian Gough

    Published 2010-01-01
    “…TreeVector is designed as a framework to integrate with these processes and produce user-customized phylogenies automatically. …”
    Get full text
    Article
  18. 118

    Secure distributed signcryption scheme based on vector space by LIU Jia, ZHUANG Yi, WANG Jian-dong

    Published 2009-01-01
    “…A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ends of both threshold signature and threshold encryption simultaneously, however, its cost was equal to threshold signature only.Furthermore, based on the discrete logarithm, properties were verified and structured, the legitimacy of the participators could be confirmed during the processes of the keys generation, distributed signcryption and distributed unsigncryption, which prevented the participators cheating.…”
    Get full text
    Article
  19. 119

    Secure distributed signcryption scheme based on vector space by LIU Jia, ZHUANG Yi, WANG Jian-dong

    Published 2009-01-01
    “…A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ends of both threshold signature and threshold encryption simultaneously, however, its cost was equal to threshold signature only.Furthermore, based on the discrete logarithm, properties were verified and structured, the legitimacy of the participators could be confirmed during the processes of the keys generation, distributed signcryption and distributed unsigncryption, which prevented the participators cheating.…”
    Get full text
    Article
  20. 120