Showing 361 - 380 results of 3,747 for search 'FRSL~', query time: 2.66s Refine Results
  1. 361
  2. 362

    Distributed Energy Management for Port Power System under False Data Injection Attacks by Qihe Shan, Xin Zhang, Qiongyue Zhang, Qiuye Sun

    Published 2022-01-01
    “…Firstly, a hierarchical topology is proposed to allocate the security resources of the port power system. …”
    Get full text
    Article
  3. 363
  4. 364

    Presentation of Ocular Syphilis in a HIV-Positive Patient with False-Negative Serologic Screening by Mahsaw N. Motlagh, Cameron G. Javid

    Published 2019-01-01
    “…In addition, retesting for syphilis will decrease the prevalence of false-negative results, especially in patients with high clinical suspicion.…”
    Get full text
    Article
  5. 365

    Fear of Pain and Fear of Falling among Younger and Older Adults with Musculoskeletal Pain Conditions by Ronald R Martin, Thomas Hadjistavropoulos, Donald R McCreary

    Published 2005-01-01
    “…A related construct, fear of falling, has been studied among elderly (but not younger) adults as an age-specific concern.…”
    Get full text
    Article
  6. 366

    Universal Superspace Unitary Operator and Nilpotent (Anti-)Dual-BRST Symmetries: Superfield Formalism by T. Bhanja, N. Srinivas, R. P. Malik

    Published 2016-01-01
    “…We exploit the key concepts of the augmented version of superfield approach to Becchi-Rouet-Stora-Tyutin (BRST) formalism to derive the superspace (SUSP) dual unitary operator and its Hermitian conjugate and demonstrate their utility in the derivation of the nilpotent and absolutely anticommuting (anti-)dual-BRST symmetry transformations for a set of interesting models of the Abelian 1-form gauge theories. …”
    Get full text
    Article
  7. 367
  8. 368

    Dual-hybrid intrusion detection system to detect False Data Injection in smart grids. by Saad Hammood Mohammed, Mandeep S Jit Singh, Abdulmajeed Al-Jumaily, Mohammad Tariqul Islam, Md Shabiul Islam, Abdulmajeed M Alenezi, Mohamed S Soliman

    Published 2025-01-01
    “…However, this advancement has also increased vulnerability to cyber threats, particularly False Data Injection Attacks (FDIAs). Traditional Intrusion Detection Systems (IDS) often fall short in identifying sophisticated FDIAs due to their reliance on predefined rules and signatures. …”
    Get full text
    Article
  9. 369
  10. 370

    A False Powder-post Beetle, Xylopsocus capucinus (Fabridius) (Insecta: Coleoptera: Bostrichidae) by Robert E. Woodruff, E. J. Gerberg, T. J. Spilman

    Published 2004-03-01
    “…On 14 March 1978, specimens were collected from cassava branches at Homestead, Florida, by J. …”
    Get full text
    Article
  11. 371
  12. 372
  13. 373
  14. 374
  15. 375

    The Fall of Fertility in Tasmania, Australia, in the late 19th and early 20th centuries by Helen Moyle

    Published 2017-06-01
    “…The paper investigates when marital fertility fell, whether the fall was mainly due to stopping or spacing behaviours, and why it fell at this time. …”
    Get full text
    Article
  16. 376

    An Integrated Metaheuristic Routing Method for Multiple-Block Warehouses with Ultranarrow Aisles and Access Restriction by Fangyu Chen, Gangyan Xu, Yongchang Wei

    Published 2019-01-01
    “…Those limitations prohibit pickers from walking through the whole aisle, and the access restriction even allows them to access the pick aisles only from specific entrances. …”
    Get full text
    Article
  17. 377
  18. 378

    Nilpotent Symmetries of a Model of 2D Diffeomorphism Invariant Theory: BRST Approach by R. P. Malik

    Published 2022-01-01
    “…Within the framework of the Becchi-Rouet-Stora-Tyutin (BRST) formalism, we discuss the full set of proper BRST and anti-BRST transformations for a 2D diffeomorphism invariant theory which is described by the Lagrangian density of a standard bosonic string. …”
    Get full text
    Article
  19. 379

    Language as a tool in achieving or failing to achieve the object of desire in Bloodied and Come Back by Shirzad Tayefi, Tohid Shalchian Nazer

    Published 2023-07-01
    “…In this research, our qualitative library-based reading of the corpus discusses the position of the phallus as a linguistic factor that always keeps the subject away from objet petit a. The results obtained from the Lacanian reading of the above-mentioned stories show that the characters in these stories have accepted their castration from the very beginning and, with the hope of attaining the phallus, they have entered the field of signification by desiring The big Other, which has in turn referred them from one sign to another. …”
    Get full text
    Article
  20. 380