-
101
-
102
QuadTPat: Quadruple Transition Pattern-based explainable feature engineering model for stress detection using EEG signals
Published 2024-11-01“…The proposed XFE model generates a DLob string, and the explainable results were obtained using this string. …”
Get full text
Article -
103
Capacitive Sensor for Monitoring the Condition of Suspended High-Voltage Insulation
Published 2024-02-01“…The calculations confirm the possibility of registration a damaged element in a insu-lators string by getting of voltage change at the sensors output. …”
Get full text
Article -
104
Identifying Lesbian, Gay, Bisexual, and Transgender Search Terminology: A Systematic Review of Health Systematic Reviews.
Published 2016-01-01“…Research on the health of lesbian, gay, bisexual, and transgender (LGBT) populations can provide important information to address existing health inequalities. …”
Get full text
Article -
105
Geolocation Android Mobile Phones Using GSM/UMTS
Published 2019-03-01“…Track a smartphone with fixed identifiers mostly SSN (SIM (Subscriber Identity Module) Serial Number) and IMEI (International Mobile Equipment Identity) derived from an identifying string unique to the user's device. The result located place is Moderate correct according to the (GSM) and (UMTS) cellular networks which is used for obtaining location information.…”
Get full text
Article -
106
-
107
Sobolev Spaces on Locally Compact Abelian Groups: Compact Embeddings and Local Spaces
Published 2014-01-01Get full text
Article -
108
Calculation of Flexible Bus-Bars Electrodynamic Stability with Application of Implicit Scheme
Published 2008-10-01“…A numerical method for calculation of open-air substations’ flexible bus-bars dynamic at short-circuit has been improved on equations of a flexible elastic string with application of an implicit scheme. On the basis of the numerical method a computer program FLEBUS for calculation of substations’ flexible bus-bars dynamic at short-circuit has been developed. …”
Get full text
Article -
109
Error monitoring and correction in violin performance: An EEG study
Published 2025-09-01Get full text
Article -
110
-
111
A PubMed search filter for efficiently retrieving exercise training studies
Published 2024-12-01“…This search string may therefore support evidence-informed practice in exercise programming.…”
Get full text
Article -
112
Feedback Control of Flow Separation Using Plasma Actuator and FBG Sensor
Published 2016-01-01Get full text
Article -
113
ABOUT “THE BOOK BULGARIAN LITERARY MODERNISM. THE PROBLEM OF TIME AND IDENTITY”
Published 2023-06-01Get full text
Article -
114
-
115
Mismatch response to polysyllabic nonwords: a neurophysiological signature of language learning capacity.
Published 2009-07-01“…Electrophysiologically measured mismatch responses were recorded to changes in consonants as participants passively listened to a repeating four syllable CV-string. The consonant change could occur in one of four positions along the CV-string and we predicted that: (a) if nonword repetition depended purely on auditory discrimination ability, then reduced mismatch responses to all four consonant changes would be observed in the poor nonword-repeaters, (b) if it depended on encoding or decay of information in a capacity-limited phonological store, then a position specific decrease in mismatch response would be observed, (c) if neither cognitive capacity was involved, then the two groups of participants would provide equivalent mismatch responses. …”
Get full text
Article -
116
-
117
-
118
Confidential communication scheme based on uncertainty of underwater noisy channels
Published 2019-04-01“…Aiming at the influence of the uncertainty of underwater noise on information transmission and the security problem of the communication over noisy channels,a confidential communication scheme based on the uncertainty of underwater noisy channels was proposed.The proposed scheme was composed of an interactive key extraction protocol based on Godel’s code and a privacy amplification protocol based on r-circulant Toeplitz matrix.During the process of key extraction,the key sequence comparing number was reduced through the Godel’s code.When calculating the key length after privacy amplification,the uncertainty of underwater noise was considered to make the proposed scheme more practical.Experimental results show that under the condition of satisfying protocol security,it takes 11.99 s to transmit 119 940 bit string where the lower bound of the generated secret key length is 117 331 bit after privacy amplification and the upper bound of the adversary’s information about the secret key is 2 609 bit.Moreover,the proposed scheme (nt+s)×(nt+s)-order r-circulant Toeplitz matrix decreases(nt+s)-1 bit memory space compared to the traditional Toeplitz matrix with the same order.…”
Get full text
Article -
119
Indices formal grammar of the Universal Decimal Classification
Published 2018-12-01Get full text
Article -
120
Forgotten Cape – Extremist violence in Northern Mozambique
Published 2025-03-01“…Methods: The study is based on the review of secondary literature, open source information, as well as Armed Conflict Location and Event Data Project’s (ACLED) relevant data. …”
Get full text
Article