Search alternatives:
generall » general (Expand Search), generate (Expand Search)
Showing 1,881 - 1,900 results of 7,085 for search 'more function (generated OR generall)', query time: 0.14s Refine Results
  1. 1881

    PERHITUNGAN NUMERIK RAPAT KEADAAN GRAPHENE BILAYER DENGAN MODEL TIGHT-BINDING MENGGUNAKAN METODE RAMBATAN WAKTU TROTTER-SUZUKI by Wahyu Setiawan

    Published 2023-08-01
    “…The number of atoms (sites) reviewed affects the regularity of the DOS calculation results. The more atoms that are reviewed, the more orderly the DOS calculations will be generated. …”
    Get full text
    Article
  2. 1882

    Analysis of Drag Torque Characteristic of Hydro-viscous Clutch with Consideration of Cavitation Effect by Sun Chunlian

    Published 2018-01-01
    “…The results show that the velocity distribution is inhomogeneous,and the fluid with the same direction of rotation has high velocity and has the function of diversion. The cavitation occurs in the intersection of the groove,the higher the speed,the larger the film thickness,the more the cavitation phenomenon. …”
    Get full text
    Article
  3. 1883

    Neural stem cell heterogeneity in adult hippocampus by Ziqi Liang, Nuomeng Jin, Weixiang Guo

    Published 2025-03-01
    “…Recently, more and more studies have shown that rather than being a homogeneous population of identical cells, adult NSCs are composed of multiple subpopulations that differ in their morphology and function. …”
    Get full text
    Article
  4. 1884

    Measurement report: Influence of particle density on secondary ice production by graupel and frozen drop collisions by S. Yadav, L. Metten, P. Grzegorczyk, A. Theis, S. K. Mitra, M. Szakáll

    Published 2025-08-01
    “…The number of fragments generated in the collisions was analyzed, following a theoretical framework, as a function of the collision kinetic energy. …”
    Get full text
    Article
  5. 1885

    Upper-Bound Analysis of Slope Reliability Considering Anisotropic Spatial Variability and Reinforcement with Anti-slide Piles by ZHAO Zi-hao, WANG Jia-rui, FU Tao-tao, ZHU En-lin

    Published 2025-01-01
    “…To ensure that the random field demonstrates general rotational anisotropy, the autocorrelation function was transformed through a coordinate system conversion before the decomposition of the autocorrelation coefficient matrix. …”
    Get full text
    Article
  6. 1886

    Preclinical Positron Emission Tomographic Imaging of Acute Hyperoxia Therapy of Chronic Hypoxia during Pregnancy by Alexander Zheleznyak, Joel R. Garbow, Michal Neeman, Suzanne E. Lapi

    Published 2015-07-01
    “…Herein we report first-in-mouse PET imaging of fetuses employing both tracers [ 18 F]FDG (metabolism) and 64 Cu-ATSM (hypoxia). [ 18 F]FDG PET/CT imaging allowed clear visualization of placental-fetal structures and supported quantification of tracer uptake, making this a sensitive tool for monitoring placental function in preclinical rodent models. These measurements illustrate the potentially irreversible damage generated by chronic exposure to hypoxia, which cannot be corrected by acute exposure to hyperoxia.…”
    Get full text
    Article
  7. 1887

    An association rule-based approach for frequent item mining of multi-stage access data by Silong Wu

    Published 2025-07-01
    “…Only one database scan is required, and frequent itemsets are directly generated without generating candidate itemsets, greatly improving the efficiency of the algorithm; Introducing weights into the improved Apriori algorithm and designing a weighted support function, by assigning different weights to different itemsets, more accurately reflects the importance and differences of itemsets in practical applications, thereby improving the accuracy of frequent item mining. …”
    Get full text
    Article
  8. 1888

    Designing a Multistage Supply Chain in Cross-Stage Reverse Logistics Environments: Application of Particle Swarm Optimization Algorithms by Tzu-An Chiang, Z. H. Che, Zhihua Cui

    Published 2014-01-01
    “…Regarding system execution time, the GA consumed more time than the other three PSOs did. Regarding objective function value, the GA, PSOA_IWM, and PSOA_CFM could obtain a lower convergence value than PSOA_VMM could. …”
    Get full text
    Article
  9. 1889

    Sharing and Specificity of Co-expression Networks across 35 Human Tissues. by Emma Pierson, GTEx Consortium, Daphne Koller, Alexis Battle, Sara Mostafavi, Kristin G Ardlie, Gad Getz, Fred A Wright, Manolis Kellis, Simona Volpi, Emmanouil T Dermitzakis

    Published 2015-05-01
    “…To understand the regulation of tissue-specific gene expression, the GTEx Consortium generated RNA-seq expression data for more than thirty distinct human tissues. …”
    Get full text
    Article
  10. 1890

    HEE-SegGAN: A holistically-nested edge enhanced GAN for pulmonary nodule segmentation. by Yong Wang, Seri Mastura Mustaza, Mohammad Syuhaimi Ab-Rahman, Siti Salasiah Mokri

    Published 2025-01-01
    “…To mitigate mode collapse, we incorporated minibatch discrimination in the discriminator, encouraging diversity in the generated samples. We also improved the loss function to better capture edge-level details and enhance segmentation precision in edge regions. …”
    Get full text
    Article
  11. 1891

    Transcriptional analysis of a unique set of genes involved in Schistosoma mansoni female reproductive biology. by Alexis A Cogswell, Valerie P Kommer, David L Williams

    Published 2012-01-01
    “…Schistosomiasis affects more than 200 million people globally. The pathology of schistosome infections is due to chronic tissue inflammation and damage from immune generated granulomas surrounding parasite eggs trapped in host tissues. …”
    Get full text
    Article
  12. 1892

    Analyse d'une formation plurilingue à distance : actions et interactions by Jean-Jacques Quintin, Monica Masperi

    Published 2006-04-01
    “…Galanet" learning schemes assemble large groups of students (from one to two hundred in general) who are geographically located in different universities and committed to completing common tasks the final objective of which is to create a quadrilingual press file publication online.The present study will be developed along two complementary axes:1. a quantitative analysis of the messages posted on the forum page of the platform for each session.2. a qualitative analysis of sample interventions generated in one of these sessions.On the one hand, the quantitative approach will allow for the highlighting of certain salient features of the e-learning experience as a whole, including how sessions function and their impact on both students and tutors.On the other hand, the qualitative approach will allow to examine and understand more fully the discursive practices elicited by the learning scenario and the plurilinguistic dimension of the forum exchanges.…”
    Get full text
    Article
  13. 1893

    Notes on Whitehead space of an algebra by M. Arian-Nejad

    Published 2002-01-01
    “…Let R be a ring, and denote by [R,R] the group generated additively by the additive commutators of R. …”
    Get full text
    Article
  14. 1894

    Stem Cells as a Tool to Improve Outcomes of Islet Transplantation by Emily Sims, Carmella Evans-Molina

    Published 2012-01-01
    “…Stem cells have been utilized not only as a functional replacement for β cells, but also as companion or supportive cells to address a variety of different obstacles that prevent ideal graft viability and function. …”
    Get full text
    Article
  15. 1895

    The relationship between protein-energy wasting and cognitive impairment in patients receiving maintenance hemodialysis by Jun Liu, Jingfang Wan, Kehong Chen, Yani He, Weiwei Zhang, Jiyuan Luo, Dan Li

    Published 2025-07-01
    “…Those combined with PEW were more likely to develop CI, and to suffer from more severe CI. …”
    Get full text
    Article
  16. 1896

    Rapid mutation of endogenous zebrafish genes using zinc finger nucleases made by Oligomerized Pool ENgineering (OPEN). by Jonathan E Foley, Jing-Ruey J Yeh, Morgan L Maeder, Deepak Reyon, Jeffry D Sander, Randall T Peterson, J Keith Joung

    Published 2009-01-01
    “…<h4>Methodology/principal findings</h4>Here we show that OPEN can also be used to generate ZFNs that function efficiently in zebrafish. …”
    Get full text
    Article
  17. 1897

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  18. 1898

    A 3D Most Vulnerable Path Search Method for Physical Protection Systems Based on the EASI Model by Aiguo Li, Yanfeng Deng

    Published 2025-01-01
    “…The search efficiency is improved by restricting the intermediate points and the angle between the start and target points and improving the heuristic function. The improved algorithms are simulated and compared, and the results show that the paths generated by the improved algorithms are more reasonable, and the algorithms consume less time and have shorter path lengths.…”
    Get full text
    Article
  19. 1899

    Mechanical Behavior and Energy Evolution of Sandstone considering Slenderness Ratio Effect by Bibo Dai, Xingdong Zhao, Shuwen Zhang, Qian Kang, Zhonghua Zhu

    Published 2020-01-01
    “…When the slenderness ratio, D, is lower than 1.5, complex failures and multiple shear planes are formed, while simple failures and single shear planes are generated at D larger than 1.5. Besides, the AE ringing counts are more obvious with a higher slenderness ratio, D, at the initial compression stage due to the greater body volume and more defects in the sandstone. …”
    Get full text
    Article
  20. 1900