Search alternatives:
generate » general (Expand Search)
generated » generald (Expand Search)
Showing 861 - 880 results of 2,920 for search 'more function (generate OR (generated OR generated))', query time: 0.25s Refine Results
  1. 861

    Experimental Investigation on Damage Characteristics and Early Warning of Frozen Coal under Uniaxial Compression by Xiang Sun, Bin Liu, Qi Dong, Feng Shi

    Published 2023-01-01
    “…The test results showed that the compressive strength of the frozen coal samples decreased significantly, and the strength of the saturated frozen coal samples was the lowest; more acoustic emissions were generated at the initial loading stage. …”
    Get full text
    Article
  2. 862

    The Effect of Lubricant Viscosity Variation on Tooth Friction and Hence on the Energetic Behaviour of Gear Unit by József Polák

    Published 2024-12-01
    “…With this modification, the estimation generated by the mathematical model describing the energetic behavior of the gear unit can be made more accurate.…”
    Get full text
    Article
  3. 863

    Design of smart agriculture based on big data and Internet of things by Chunling Li, Ben Niu

    Published 2020-05-01
    “…The algorithm in this article can realize the functions of real-time data communication and information processing more efficiently, and has a significant role in promoting agricultural informatization and improving the level of agricultural modernization.…”
    Get full text
    Article
  4. 864
  5. 865

    PERHITUNGAN NUMERIK RAPAT KEADAAN GRAPHENE BILAYER DENGAN MODEL TIGHT-BINDING MENGGUNAKAN METODE RAMBATAN WAKTU TROTTER-SUZUKI by Wahyu Setiawan

    Published 2023-08-01
    “…The number of atoms (sites) reviewed affects the regularity of the DOS calculation results. The more atoms that are reviewed, the more orderly the DOS calculations will be generated. …”
    Get full text
    Article
  6. 866

    Design of the optimal groundwater quality monitoring network using a genetic algorithm based optimization approach by Somaye Janatrostami, Ali Salahi

    Published 2020-06-01
    “…In this paper, two conflicting objective functions are simultaneously solved. The first objective function is the maximization of the match between the interpolated EC distributions obtained from data of the all available monitoring wells and the wells from the newly generated network. …”
    Get full text
    Article
  7. 867

    A New Extention of the Odd Inverse Weibull-G Family of Distributions: Bayesian and Non-Bayesian Estimation with Engineering Applications by Yassmen Y. Abdelall, Amal Soliman Hassan, Ehab M. Almetwally

    Published 2024-11-01
    “…In this work, we propose a novel generator called the "extended odd inverse Weibull-generator" to obtain better distribution flexibility. …”
    Get full text
    Article
  8. 868

    Exploring public sector workforce attitudes toward AI competence and its impact on AI competence self-assessment by Gatis Lāma, Agnese Lastovska

    Published 2025-01-01
    “…Additionally, more than half of the respondents expressed limited trust in AI-generated information, with only seven participants fully trusting AI. …”
    Get full text
    Article
  9. 869

    Plasma membrane-coated nanoparticles and membrane vesicles to orchestrate multimodal antitumor immunity by Yang Li, Toshiaki Yoshikawa, Yusuke Ito, Satoshi Inoue, Takahiro Nakashima, Noriko Nakamura, Tetsuya Matsukawa, Seiichi Ohta, Yuki Kagoya, Hitomi Kasuya, Mirei Kataoka, Haosong Zhang, Chitose Oneyama

    Published 2025-01-01
    “…Here, we hypothesized that the simultaneous input of more comprehensive signals would elicit more robust and durable effector T-cell functions.Methods We genetically engineered the leukemia cell line K562 to express BsAbs, costimulatory ligands, cytokines, and blocking antibodies against immune checkpoint molecules on the cell surface, from which we obtained plasma membrane fractions by mechanical homogenization and subsequent isolation steps. …”
    Get full text
    Article
  10. 870

    Lightweight Explicit 3D Human Digitization via Normal Integration by Jiaxuan Liu, Jingyi Wu, Ruiyang Jing, Han Yu, Jing Liu, Liang Song

    Published 2025-02-01
    “…This loss function provides a more accurate measure of surface reconstruction quality and enhances the overall reconstruction performance. …”
    Get full text
    Article
  11. 871

    The relationship between protein-energy wasting and cognitive impairment in patients receiving maintenance hemodialysis by Jun Liu, Jingfang Wan, Kehong Chen, Yani He, Weiwei Zhang, Jiyuan Luo, Dan Li

    Published 2025-07-01
    “…Those combined with PEW were more likely to develop CI, and to suffer from more severe CI. …”
    Get full text
    Article
  12. 872

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  13. 873

    Positivity bounds in scalar Effective Field Theories at one-loop level by Yunxiao Ye, Bin He, Jiayin Gu

    Published 2024-12-01
    “…In particular, the one-loop generated dimension-8 operator coefficients (that would be positive if generated at the tree level), as well as their β-functions are generally not subject to positivity bounds as they might correspond to interference terms of the cross sections under the optical theorem, which could have either sign. …”
    Get full text
    Article
  14. 874

    Site specific mutation of the Zic2 locus by microinjection of TALEN mRNA in mouse CD1, C3H and C57BL/6J oocytes. by Benjamin Davies, Graham Davies, Christopher Preece, Rathi Puliyadi, Dorota Szumska, Shoumo Bhattacharya

    Published 2013-01-01
    “…This technology enables allelic series of mutations to be generated quickly and efficiently in diverse genetic backgrounds and will be a valuable approach to rapidly create mutations in mice already bearing one or more mutant alleles at other genetic loci without the need for lengthy backcrossing.…”
    Get full text
    Article
  15. 875

    Seeking help for menstrual pain during adolescence: A mixed-methods retrospective survey of treatment experiences and preferences by Kayla M Wall, Marta C Erlandson, Michelle M Gagnon

    Published 2025-02-01
    “…Background: Menstrual pain can significantly impact adolescents’ well-being and functioning. Despite the prevalence of adolescent menstrual pain, information about adolescents’ experiences seeking treatment is limited. …”
    Get full text
    Article
  16. 876

    Design and Application of ATS Dispatch Path Search Method by ZHANG Yanqiu, LI Denggen, WANG Min'an, TAO Cui

    Published 2023-02-01
    “…The method has been applied to Changsha urban rail transit Line 3 and Line 4, Wuxi urban rail transit Line 4, to support plan editing and train scheduling, and achieves good results, such as the generation time of station map can reduce over 70%,incidental jamming of the route trigger is eliminated when there are more trains,and route files can be generated automatically within minutes (original manual generation took several days).…”
    Get full text
    Article
  17. 877

    The “What” of Athletes’ Goal Pursuit and Its Relationships to Goal-Related Processes and Well- and Ill-Being by Natalia Martínez-González, Francisco L. Atienza, Joan L. Duda, Isabel Balaguer

    Published 2025-05-01
    “…The results showed that intrinsic goals, assessed in an open-ended format, were more heterogeneous in terms of content, and more common among athletes than extrinsic goals. …”
    Get full text
    Article
  18. 878

    Constructing a web recommender system using web usage mining and user’s profiles by T. Mombeini, A. Harounabadi, J. Rezaeian Sheshdeh

    Published 2014-12-01
    “…Date is of importance since it is more possible for users to request new pages more than old ones and old pages are less probable to be viewed, as users mostly look for new information. …”
    Get full text
    Article
  19. 879

    Deformation anisotropy and lamellar α re-orientation of TC17 alloy under the different slip modes of HCP structure by Cong Li, Jiao Luo

    Published 2024-11-01
    “…Therein, the variation of the rotation factor with tilt angle conforms to the quadratic function, reaching a maximum value around 45°. When the rotation factor is small, the ratio of (01–11) [1–210] slip system with small Burgers vector at the phase boundary is large, the rotation tendency is poor, and the intragranular dislocation slip replaces the grain rotation as the strain accommodation mechanism, the lamella is more prone to globularization. …”
    Get full text
    Article
  20. 880

    Advances in the study of the role of high-frequency mutant subunits of the SWI/SNF complex in tumors by Jiumei Zhao, Jing Zhu, Yu Tang, Kepu Zheng, Ziwei Li

    Published 2024-12-01
    “…As a catalytic subunit of the SWI/SNF complex, SMARCA4 has ATPase activity that catalyzes the hydrolysis of ATP to produce energy and power the chromatin remodeling complex, which is critical to the function of the SWI/SNF complex. The study data indicate that approximately 25% of cancers have one or more SWI/SNF subunit genetic abnormalities, and at least nine different SWI/SNF subunits have been identified as having repeated mutations multiple times in various cancers, suggesting that mutations affecting SWI/SNF subunits may introduce vulnerabilities to these cancers. …”
    Get full text
    Article