Showing 621 - 640 results of 2,686 for search '"provenance"', query time: 0.07s Refine Results
  1. 621

    Neurophobia: causes and methods to reduce it by Š. Jukna, Rūta Mameniškienė

    Published 2021-12-01
    “…The concept of neurophobia was first mentioned by Ralph Jozefowicz in 1994, but only in 2002 neurophobia was scientifically proven. Since then, research around the world has shown that medical students rate neurology as the most complex discipline, have the lowest level of confidence in their neurological knowledge, and feel the least confident in their competencies when assessing patients with neurological problems. …”
    Get full text
    Article
  2. 622

    Output Feedback Control for Asymptotic Stabilization of Spacecraft with Input Saturation by Chutiphon Pukdeboon

    Published 2017-01-01
    “…Asymptotic stability is proven by Lyapunov stability theory. Moreover, a new nonlinear disturbance observer is designed to compensate for external disturbances. …”
    Get full text
    Article
  3. 623

    Research on verification of behavior requirement patterns based on action sequences by DU Jun-wei1, XU Zhong-wei2, JIANG Feng1

    Published 2011-01-01
    “…Function behavior requirements(FBR) and safety behavior requirements(SBR) were described by action se-quences.Compared with the traditional logic or graphic form,action sequences can express the temporal relationship among interactive behaviors more exactly.Moreover,FBR pattern and SBR pattern are constructed by action sequences,and the operation semantics of these patterns are also given.To implement the requirement verification based on behavior patterns,the necessary and sufficient conditions as well as the checking algorithm for the satisfiability of FBR pattern and SBR pattern are presented and proven by redefining the property expression and combination operation of LTS’s safety and liveness.The framework has been widely applied in the formal verification & validation of component-based CTCS2/3 systems,and has shown great theoretical and practical significance to combinational verification of Compo-nent-based safety-critical systems.…”
    Get full text
    Article
  4. 624

    Density-functional theory formulated in terms of functional integrals by Gérald Faussurier

    Published 2025-01-01
    “…In particular, the Kohn and Sham equations are proven to appear naturally by performing a saddle-point evaluation of a specific functional integral. …”
    Get full text
    Article
  5. 625

    Analysis Of Family Conflict of Child Victims Sexual Violence in Palembang City by Yosi Arianti, Safira Soraida, Gita Isyanawulan, Adetia Wulindari

    Published 2025-01-01
    “…Family support, including emotional, instrumental, information, and appreciation, has proven crucial in the recovery process. The results of this research provide insight into the impact of sexual violence on families and provide more effective recommendations for handling similar cases. …”
    Get full text
    Article
  6. 626

    Mycelium-Based Composite: The Future Sustainable Biomaterial by Digafe Alemu, Mesfin Tafesse, Ajoy Kanti Mondal

    Published 2022-01-01
    “…To ensure the physicochemical property of the fabricated composite, mycelium morphology, bimolecular content, density, compressive strength, thermal stability, and hydrophobicity were determined. This composite is proven to be used for different applications such as packaging, architectural designs, walls, and insulation. …”
    Get full text
    Article
  7. 627

    Practical group signature scheme with verifier-local revocation by LI Ji-guo, SUN Gang, ZHANG Yi-chen

    Published 2011-01-01
    “…An efficient approach of member revocation in group signature is verifier-local revocation.In this approach,revocation messages are only sent to signature verifiers,while signers have no involvement.There are some problems in group signature with verifier-local revocation;for example,some group signature schemes do not have exculpability and the computation cost of revocation check is dependent on the length of the revocation list,and so on.In order to solve above problems,and aim at the application of group signatures for enabling privacy-preserving attestation,a practical group signature scheme with verifier-local revocation based on the strong Diffie-Hellman assumption and decision linear Diffie-Hellman assumption,which was proven to be secure in the random Oracle model was proposed.The efficiency of the proposed scheme was analyzed.Compared with the existing verifier-local revocation group signatures,the computa-tion cost of revocation check in the scheme is independent of the length of the revocation list.At the same time,the scheme satisfies exculpability and backward unlinkability.…”
    Get full text
    Article
  8. 628

    Current Controversies in Newer Therapies to Treat Birth Asphyxia by Pia Wintermark

    Published 2011-01-01
    “…Over the past several years, mild hypothermia has been proven to be safe to treat HIE. Unfortunately, this neuroprotective strategy seems efficient in preventing brain injury in some asphyxiated newborns, but not in all of them. …”
    Get full text
    Article
  9. 629

    Medical Devices Made of Substances: The Need for a Change in Approach in Paediatrics by Stefano Stagi

    Published 2022-06-01
    “…The benefits of using MDMSs to treat paediatric conditions such as gastrointestinal disorders and obesity have been proven, although there remains a degree of uncertainty about the precise mechanism of action underlying their therapeutic effectiveness. …”
    Get full text
    Article
  10. 630

    Hodological patterning as an organizing principle in vertebrate motor circuitry by Joel C. Glover

    Published 2025-01-01
    “…At the cortical level, somatotopic organization suggests a potential underlying hodological patterning, but this has not been proven. This review describes examples of hodological patterning in motor circuits and covers current knowledge about how this patterning arises.…”
    Get full text
    Article
  11. 631

    INTEGRATION OF EDUCATION, SCIENCE, AND BUSINESS: CURRENT INSTITUTIONAL SOLUTIONS by V. S. SHEINBAUM, O. V. BUDZINSKAYA

    Published 2018-02-01
    “…For the purposes to develop recommendations, proven forms of integration based on international practices are reviewed and applied to Gubkin University. …”
    Get full text
    Article
  12. 632

    Outage probability and capacity analysis of distributed MIMO systems over a composite fading channel by Wen-jie PENG, Yue-heng LI, Tuan-jie XUE, Mei-yan JU, Ping HUANG

    Published 2015-02-01
    “…The exact closed-form expressions about the outage probability and capacity of distributed MIMO systems over a composite fading channel are derived firstly by using Lognormal approximation to complicated Gamma-lognormal distribution when mobile station (MS) in the cell is fixed at some position and the so-called maximum ratio transmission/selected combining (MRT-SC) and selected transmission/maximum ratio combining (ST-MRC) schemes are adopted in uplink and downlink respectively.Then based on a newly proposed non-uniform MS cell distribution model,which is more consistent with the MS cell hotspot distribution in an actual communication environment,the average outage probability and capacity formulas synthesizing the MS cell position information are further derived.Finally,the accuracy of the approximation method and the rationality of the corresponding theoretical analysis about the system performance are proven and illustrated by computer simulations.…”
    Get full text
    Article
  13. 633

    Deriving active database triggers from business rules model with conceptual graphs by Irma Valatkaitė, Olegas Vasilecas

    Published 2002-12-01
    “… ECA rules implemented into database management systems (DBMS) as triggers have proven to be powerful and effective mechanisms to enforce business rules in applications. …”
    Get full text
    Article
  14. 634

    Left Atrial Myxoma: A Rare Nonatherosclerotic Cause of Acute Myocardial Infarction by Rey Francisco Arcenas, Mir Ishtiaque Ali

    Published 2013-01-01
    “…A 2D echocardiogram performed two days later revealed a left atrial mass, which was successfully resected and proven to be a myxoma. No recurrence of the tumor was seen on follow-up after four months. …”
    Get full text
    Article
  15. 635

    Updated COVID-19 Condition in Australia by Ke-Yan Loo, Vengadesh Letchumanan, Loh Teng-Hern Tan, Jodi Woan Fei Law

    Published 2021-12-01
    “…The strategies used by the Australian government have proven to be effective and efficient in managing outbreaks amidst the pandemic. …”
    Get full text
    Article
  16. 636

    Two-stage authentication and key agreement protocol for commuting in Internet of vehicles by ZHANG Haibo, YU Yi, WANG Dongyu, HE Xiaofan

    Published 2024-05-01
    “…Additionally, the security of the protocol was proven by a random oracle. In a typical commuting scenario, the simulation results show that the protocol outcomes a reduction in computation overhead by 59.35% and communication overhead by 44.21%, compared to existing similar literature.…”
    Get full text
    Article
  17. 637

    The heat energy dissipated in a control volume to correlate the crack propagation rate in stainless steel specimens by G. Meneghetti, M. Ricotta

    Published 2017-06-01
    “…The heat energy dissipated in a unit volume of material per cycle (the Q parameter) has proven to be effective as a fatigue damage index in case of AISI 304L plain and notched specimens. …”
    Get full text
    Article
  18. 638

    Unclonable dynamic k-times anonymous authentication by Xin LIU, Qiu-liang XU

    Published 2012-07-01
    “…In previous works of k-times anonymous authentication,two problems have not been properly solved:1)how to allow application providers to assign different maximal numbers of access for each user without weakened anonymity,and 2)how to protect against massive clone attacks mounted by malicious users.To overcome these obstacles,a revised scheme was proposed.It incorporated several crucial tools including the proof that a committed value is less than another committed value,dynamic accumulator,the method of cloning detection based on n-times show e-tokens,etc.The new scheme is proven secure in a new security model which was obtained by modifying the security model of Teranishi et al.Moreover,the registration protocol of the new scheme is concurrently-secure,so it is fit for the deployment in realistic asynchronous network setting(e.g.…”
    Get full text
    Article
  19. 639

    Synthesis and Characterization of a Gd-DOTA--Permeation Peptide for Magnetic Resonance Relaxation Enhancement of Intracellular Targets by Andrew M. Prantner, Vijay Sharma, Joel R. Garbow, David Piwnica-Worms

    Published 2003-10-01
    “…Many MR contrast agents have been developed and proven effective for extracellular nontargeted applications, but exploitation of intracellular MR contrast agents has been elusive due to the permeability barrier of the plasma membrane. …”
    Get full text
    Article
  20. 640

    Therapeutic Benefit of Vernonia amygdalina in the Treatment of Diabetes and Its Associated Complications in Preclinical Studies by Du-Bois Asante, Gideon Akuamoah Wiafe

    Published 2023-01-01
    “…Vernonia amygdalina (VA), one of the highly researched species in the Asteraceae family, has proven to possess potent antidiabetic properties. …”
    Get full text
    Article