Suggested Topics within your search.
Suggested Topics within your search.
- methods 5
- Abdomen 4
- Anatomy 4
- Chest 4
- Dissection 4
- Extremities (Anatomy) 4
- Human anatomy 4
- Tourism 4
- Anatomy, Regional 2
- Biochemistry 2
- Molecular biology 2
- 17 drug summaries 1
- 44.83 rheumatology, orthopedics 1
- Anatomy, Surgical and topographical 1
- Chemical engineering 1
- Company law 1
- Comparative method 1
- Cross-cultural studies 1
- Diagnosis, Differential 1
- Domestic relations 1
- English 1
- English language 1
- Ethnology 1
- Fluid mechanics 1
- Grammar 1
- Gynecology 1
- Horticultural crops 1
- Identification 1
- Interpretation and construction 1
- Law 1
-
1281
Effects of Hydrostatic Pocket Shape on the Flow Pattern and Pressure Distribution
Published 1995-01-01Subjects: Get full text
Article -
1282
Effect of branchings on blood flow in the system of human coronary arteries
Published 2011-11-01Subjects: Get full text
Article -
1283
The approximation problems of solutions of the compressible fluid flow in an exterior domain
Published 2002-12-01“… The approximation of solutions of the three-dimensional steady compressible flow (linearized problem) in an exterior domain is studied. …”
Get full text
Article -
1284
Orgasm. On the flux and flow of a term through times and spaces
Published 2023-12-01Get full text
Article -
1285
Applying System Dynamics to Simulate the Passenger Flow in Subway Stations
Published 2019-01-01“…A macroscopic passenger flow simulation model based on system dynamics is proposed in this paper. …”
Get full text
Article -
1286
Behaviour of the Foramen Ovale Flow in Fetuses with Intrauterine Growth Restriction
Published 2018-01-01“…Background. Foramen ovale (FO) flow may be altered in IUGR. This study was designed to test this hypothesis. …”
Get full text
Article -
1287
Validity Investigation of Random Energy Flow Analysis for Beam Structures
Published 2011-01-01“…The validity of the application of energy flow analysis for beam structures under random excitations is investigated in this paper. …”
Get full text
Article -
1288
Measurements of the Flow in Backshroud/Casing Clearance of Precessing Centrifugal Impeller
Published 1997-01-01Subjects: Get full text
Article -
1289
Application of Flow Regime Automatic System to Douyan Hydropower Station
Published 2001-01-01Get full text
Article -
1290
CONCEPTUAL BASICS OF STANDARDIZATION OF ECOLOGICAL AND FREE FLOW FOR RIVERS IN KAZAKHSTAN
Published 2020-10-01Subjects: “…ecological flow…”
Article -
1291
On deriving lumped models for blood flow and pressure in the systemic arteries
Published 2004-02-01“…Windkessel and similar lumped models are often used to represent blood flow and pressure in systemic arteries. The windkessel model was originally developed by Stephen Hales (1733) and Otto Frank (1899) who used it to describe blood flow in the heart. …”
Get full text
Article -
1292
Impact of Guideline Markings on Saturation Flow Rate at Signalized Intersections
Published 2019-01-01“…The underlying reasons for the impact of intersection guideline markings on the saturation flow rate are discussed. The results reveal that the improvement in the saturation flow rate obtained from painting guide line markings is positively correlated with the number of traffic lanes, offset of through movement, and turning angle of left-turns. …”
Get full text
Article -
1293
Air Traffic Flow Prediction with Spatiotemporal Knowledge Distillation Network
Published 2024-01-01“…Accurate air traffic flow prediction assists controllers formulate control strategies in advance and alleviate air traffic congestion, which is important to flight safety. …”
Get full text
Article -
1294
Detecting P2P botnet based on the role of flows
Published 2012-09-01“…Towards the weaknesses of the existing detection methods of P2P botnet,a novel real-time detection model based on the role of flows was proposed,which was named as RF.According to the characteristics of flows,the model made the flows play the different roles in the detection of the P2P botnet to detect the essential abnormality and the attacking abnormality.And the model considered the influence on the detection of the P2P botnet which the Web applications generated,especially the applications based on the P2P protocols.To minimize the false positive rate and false negative rate,a real-time method based on the sliding window to estimate the Hurst parameter was proposed,and the Kaufman algorithm was applied to adjust the threshold dynamically.The experiments showed that the model was able to detect the new P2P botnet with a relatively high precision.…”
Get full text
Article -
1295
Flow-based electronic resource network behavior analysis practice
Published 2024-11-01“…A method based on the classification and aggregation of network flows into long and short flows was proposed. By finely classifying and statistically analyzing traffic, it accurately assessed the usage behaviors of different types of users. …”
Get full text
Article -
1296
Nanoconfined Water in Shales and Its Impact on Real Gas Flow
Published 2021-01-01“…In this work, a new unified real gas-transport model has been developed for both organic and inorganic porous media accounting for the nanoconfined water film flow. More specifically, a gas core flows in the center of the organic/inorganic pore surrounded by a water film which can be further divided into an interfacial region (near-wall water) and bulk region (bulk water). …”
Get full text
Article -
1297
A Note on the Eigenvalue Analysis of the SIMPLE Preconditioning for Incompressible Flow
Published 2012-01-01Get full text
Article -
1298
Clear Water Flows Freely and Unceasingly From Year to Year
Published 2009-01-01Get full text
Article -
1299
Qualitative Analysis of Coating Flows on a Rotating Horizontal Cylinder
Published 2012-01-01“…The parameters involved determine a rich variety of qualitatively different flows. We obtain sufficient conditions for finite speed of support propagation and for waiting time phenomena by application of a new extension of Stampacchia's lemma for a system of functional equations.…”
Get full text
Article -
1300
Exploit detection based on illegal control flow transfers identification
Published 2014-09-01“…In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of control flow transfers occurred during the target program's running.When a call/ret/jmp was about to execute,the target was checked according to the CFSO.The illegal control flow transfer is considered as an exploit attack and all the following attacking steps could be captured.The ex-periment also showed that proposed method had decent overhead and could be applied to detect exploits online.…”
Get full text
Article