Search alternatives:
string » strong (Expand Search)
Showing 101 - 120 results of 297 for search 'string information', query time: 0.10s Refine Results
  1. 101
  2. 102

    QuadTPat: Quadruple Transition Pattern-based explainable feature engineering model for stress detection using EEG signals by Veysel Yusuf Cambay, Irem Tasci, Gulay Tasci, Rena Hajiyeva, Sengul Dogan, Turker Tuncer

    Published 2024-11-01
    “…The proposed XFE model generates a DLob string, and the explainable results were obtained using this string. …”
    Get full text
    Article
  3. 103

    Capacitive Sensor for Monitoring the Condition of Suspended High-Voltage Insulation by Andreenkov E.S., Shunaev S.A.

    Published 2024-02-01
    “…The calculations confirm the possibility of registration a damaged element in a insu-lators string by getting of voltage change at the sensors output. …”
    Get full text
    Article
  4. 104

    Identifying Lesbian, Gay, Bisexual, and Transgender Search Terminology: A Systematic Review of Health Systematic Reviews. by Joseph G L Lee, Thomas Ylioja, Mellanye Lackey

    Published 2016-01-01
    “…Research on the health of lesbian, gay, bisexual, and transgender (LGBT) populations can provide important information to address existing health inequalities. …”
    Get full text
    Article
  5. 105

    Geolocation Android Mobile Phones Using GSM/UMTS by Jafaar et al.

    Published 2019-03-01
    “…Track a smartphone with fixed identifiers mostly SSN (SIM (Subscriber Identity Module) Serial Number) and IMEI (International Mobile Equipment Identity) derived from an identifying string unique to the user's device. The result located place is Moderate correct according to the (GSM) and (UMTS) cellular networks which is used for obtaining location information.…”
    Get full text
    Article
  6. 106
  7. 107
  8. 108

    Calculation of Flexible Bus-Bars Electrodynamic Stability with Application of Implicit Scheme by Y. G. Panamarenka

    Published 2008-10-01
    “…A numerical method for calculation of open-air substations’ flexible bus-bars dynamic at short-circuit has been improved on equations of a flexible elastic string with application of an implicit scheme. On the basis of the numerical method a computer program FLEBUS for calculation of substations’ flexible bus-bars dynamic at short-circuit has been developed. …”
    Get full text
    Article
  9. 109
  10. 110
  11. 111

    A PubMed search filter for efficiently retrieving exercise training studies by Dawei Yin, Mikaela V. Engracia, Matthew K. Edema, David C. Clarke

    Published 2024-12-01
    “…This search string may therefore support evidence-informed practice in exercise programming.…”
    Get full text
    Article
  12. 112
  13. 113
  14. 114
  15. 115

    Mismatch response to polysyllabic nonwords: a neurophysiological signature of language learning capacity. by Johanna G Barry, Mervyn J Hardiman, Dorothy V M Bishop

    Published 2009-07-01
    “…Electrophysiologically measured mismatch responses were recorded to changes in consonants as participants passively listened to a repeating four syllable CV-string. The consonant change could occur in one of four positions along the CV-string and we predicted that: (a) if nonword repetition depended purely on auditory discrimination ability, then reduced mismatch responses to all four consonant changes would be observed in the poor nonword-repeaters, (b) if it depended on encoding or decay of information in a capacity-limited phonological store, then a position specific decrease in mismatch response would be observed, (c) if neither cognitive capacity was involved, then the two groups of participants would provide equivalent mismatch responses. …”
    Get full text
    Article
  16. 116
  17. 117
  18. 118

    Confidential communication scheme based on uncertainty of underwater noisy channels by Ming XU, Fang CHEN

    Published 2019-04-01
    “…Aiming at the influence of the uncertainty of underwater noise on information transmission and the security problem of the communication over noisy channels,a confidential communication scheme based on the uncertainty of underwater noisy channels was proposed.The proposed scheme was composed of an interactive key extraction protocol based on Godel’s code and a privacy amplification protocol based on r-circulant Toeplitz matrix.During the process of key extraction,the key sequence comparing number was reduced through the Godel’s code.When calculating the key length after privacy amplification,the uncertainty of underwater noise was considered to make the proposed scheme more practical.Experimental results show that under the condition of satisfying protocol security,it takes 11.99 s to transmit 119 940 bit string where the lower bound of the generated secret key length is 117 331 bit after privacy amplification and the upper bound of the adversary’s information about the secret key is 2 609 bit.Moreover,the proposed scheme (nt+s)×(nt+s)-order r-circulant Toeplitz matrix decreases(nt+s)-1 bit memory space compared to the traditional Toeplitz matrix with the same order.…”
    Get full text
    Article
  19. 119
  20. 120

    Forgotten Cape – Extremist violence in Northern Mozambique by Károly Gergely

    Published 2025-03-01
    “…Methods: The study is based on the review of secondary literature, open source information, as well as Armed Conflict Location and Event Data Project’s (ACLED) relevant data. …”
    Get full text
    Article