Suggested Topics within your search.
Suggested Topics within your search.
-
861
Experimental Investigation on Damage Characteristics and Early Warning of Frozen Coal under Uniaxial Compression
Published 2023-01-01“…The test results showed that the compressive strength of the frozen coal samples decreased significantly, and the strength of the saturated frozen coal samples was the lowest; more acoustic emissions were generated at the initial loading stage. …”
Get full text
Article -
862
The Effect of Lubricant Viscosity Variation on Tooth Friction and Hence on the Energetic Behaviour of Gear Unit
Published 2024-12-01“…With this modification, the estimation generated by the mathematical model describing the energetic behavior of the gear unit can be made more accurate.…”
Get full text
Article -
863
Design of smart agriculture based on big data and Internet of things
Published 2020-05-01“…The algorithm in this article can realize the functions of real-time data communication and information processing more efficiently, and has a significant role in promoting agricultural informatization and improving the level of agricultural modernization.…”
Get full text
Article -
864
-
865
PERHITUNGAN NUMERIK RAPAT KEADAAN GRAPHENE BILAYER DENGAN MODEL TIGHT-BINDING MENGGUNAKAN METODE RAMBATAN WAKTU TROTTER-SUZUKI
Published 2023-08-01“…The number of atoms (sites) reviewed affects the regularity of the DOS calculation results. The more atoms that are reviewed, the more orderly the DOS calculations will be generated. …”
Get full text
Article -
866
Design of the optimal groundwater quality monitoring network using a genetic algorithm based optimization approach
Published 2020-06-01“…In this paper, two conflicting objective functions are simultaneously solved. The first objective function is the maximization of the match between the interpolated EC distributions obtained from data of the all available monitoring wells and the wells from the newly generated network. …”
Get full text
Article -
867
A New Extention of the Odd Inverse Weibull-G Family of Distributions: Bayesian and Non-Bayesian Estimation with Engineering Applications
Published 2024-11-01“…In this work, we propose a novel generator called the "extended odd inverse Weibull-generator" to obtain better distribution flexibility. …”
Get full text
Article -
868
Exploring public sector workforce attitudes toward AI competence and its impact on AI competence self-assessment
Published 2025-01-01“…Additionally, more than half of the respondents expressed limited trust in AI-generated information, with only seven participants fully trusting AI. …”
Get full text
Article -
869
Plasma membrane-coated nanoparticles and membrane vesicles to orchestrate multimodal antitumor immunity
Published 2025-01-01“…Here, we hypothesized that the simultaneous input of more comprehensive signals would elicit more robust and durable effector T-cell functions.Methods We genetically engineered the leukemia cell line K562 to express BsAbs, costimulatory ligands, cytokines, and blocking antibodies against immune checkpoint molecules on the cell surface, from which we obtained plasma membrane fractions by mechanical homogenization and subsequent isolation steps. …”
Get full text
Article -
870
Lightweight Explicit 3D Human Digitization via Normal Integration
Published 2025-02-01“…This loss function provides a more accurate measure of surface reconstruction quality and enhances the overall reconstruction performance. …”
Get full text
Article -
871
The relationship between protein-energy wasting and cognitive impairment in patients receiving maintenance hemodialysis
Published 2025-07-01“…Those combined with PEW were more likely to develop CI, and to suffer from more severe CI. …”
Get full text
Article -
872
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
873
Positivity bounds in scalar Effective Field Theories at one-loop level
Published 2024-12-01“…In particular, the one-loop generated dimension-8 operator coefficients (that would be positive if generated at the tree level), as well as their β-functions are generally not subject to positivity bounds as they might correspond to interference terms of the cross sections under the optical theorem, which could have either sign. …”
Get full text
Article -
874
Site specific mutation of the Zic2 locus by microinjection of TALEN mRNA in mouse CD1, C3H and C57BL/6J oocytes.
Published 2013-01-01“…This technology enables allelic series of mutations to be generated quickly and efficiently in diverse genetic backgrounds and will be a valuable approach to rapidly create mutations in mice already bearing one or more mutant alleles at other genetic loci without the need for lengthy backcrossing.…”
Get full text
Article -
875
Seeking help for menstrual pain during adolescence: A mixed-methods retrospective survey of treatment experiences and preferences
Published 2025-02-01“…Background: Menstrual pain can significantly impact adolescents’ well-being and functioning. Despite the prevalence of adolescent menstrual pain, information about adolescents’ experiences seeking treatment is limited. …”
Get full text
Article -
876
Design and Application of ATS Dispatch Path Search Method
Published 2023-02-01“…The method has been applied to Changsha urban rail transit Line 3 and Line 4, Wuxi urban rail transit Line 4, to support plan editing and train scheduling, and achieves good results, such as the generation time of station map can reduce over 70%,incidental jamming of the route trigger is eliminated when there are more trains,and route files can be generated automatically within minutes (original manual generation took several days).…”
Get full text
Article -
877
The “What” of Athletes’ Goal Pursuit and Its Relationships to Goal-Related Processes and Well- and Ill-Being
Published 2025-05-01“…The results showed that intrinsic goals, assessed in an open-ended format, were more heterogeneous in terms of content, and more common among athletes than extrinsic goals. …”
Get full text
Article -
878
Constructing a web recommender system using web usage mining and user’s profiles
Published 2014-12-01“…Date is of importance since it is more possible for users to request new pages more than old ones and old pages are less probable to be viewed, as users mostly look for new information. …”
Get full text
Article -
879
Deformation anisotropy and lamellar α re-orientation of TC17 alloy under the different slip modes of HCP structure
Published 2024-11-01“…Therein, the variation of the rotation factor with tilt angle conforms to the quadratic function, reaching a maximum value around 45°. When the rotation factor is small, the ratio of (01–11) [1–210] slip system with small Burgers vector at the phase boundary is large, the rotation tendency is poor, and the intragranular dislocation slip replaces the grain rotation as the strain accommodation mechanism, the lamella is more prone to globularization. …”
Get full text
Article -
880
Advances in the study of the role of high-frequency mutant subunits of the SWI/SNF complex in tumors
Published 2024-12-01“…As a catalytic subunit of the SWI/SNF complex, SMARCA4 has ATPase activity that catalyzes the hydrolysis of ATP to produce energy and power the chromatin remodeling complex, which is critical to the function of the SWI/SNF complex. The study data indicate that approximately 25% of cancers have one or more SWI/SNF subunit genetic abnormalities, and at least nine different SWI/SNF subunits have been identified as having repeated mutations multiple times in various cancers, suggesting that mutations affecting SWI/SNF subunits may introduce vulnerabilities to these cancers. …”
Get full text
Article