Showing 761 - 780 results of 965 for search 'Hot Haus~', query time: 1.39s Refine Results
  1. 761

    Wear Properties of TiC-Reinforced Co50 Composite Coatings from Room Temperature to High Temperature by Nga Thi-Hong Pham, Van-Thuc Nguyen

    Published 2020-01-01
    “…The Co + 20% TiC coating has high hardness and wear resistance.…”
    Get full text
    Article
  2. 762

    Review on dietary supplements as an effective improvement of Alzheimer’s disease: focus on structures and mechanisms by Sheng Li, Yinling Wei, Zhenzhen Liang, Lingli Guo, Xiaojiang Hao, Yu Zhang

    Published 2024-07-01
    “…The search for inhibitors of AD markers from dietary supplements (DSs) has become a major hot topic. Especially with the widespread use of DSs, DSs containing polyphenols, alkaloids, terpenes, polysaccharides and other bioactive components can prevent AD by reducing Aβ deposition, inhibiting tau protein hyperphosphorylation, reconstructing synaptic dysfunction, weakening cholinesterase activity, regulating mitochondrial oxidative stress, neuronal inflammation and apoptosis. …”
    Get full text
    Article
  3. 763

    Fire Retardancy Properties and Thermal Degradation of Three Timber Species Overlayed by Sengon Wood Charcoal by Joko Sulistyo, Sri Nugroho Marsoem, Tomy Listyanto, Yus Andhini Bhekti Pertiwi Bhekti Pertiwi

    Published 2020-07-01
    “…Fire disaster in wooden houses threaten human lifes. Efforts have been implemented to improve fire retardancy properties of timbers for wooden houses. …”
    Get full text
    Article
  4. 764

    Oil-Based Drilling Fluid Plugging Method for Strengthening Wellbore Stability of Shale Gas by Pengcheng Wu, Chengxu Zhong, Zhengtao Li, Zhen Zhang, Zhiyuan Wang, Weian Huang

    Published 2021-01-01
    “…Based on X-ray diffraction, electron microscope scanning, linear swelling experiment, and hot-rolling dispersion experiment, the physicochemical mechanism of wellbore instability in complex strata was revealed, and thus, the coordinated wellbore stability method can be put forward, which is “strengthening plugging of micropores, inhibiting filtrate invasion, and retarding pressure transmission.” …”
    Get full text
    Article
  5. 765

    AIS-Based Vessel Trajectory Compression: A Systematic Review and Software Development by Ryan Wen Liu, Shiqi Zhou, Shangkun Yin, Yaqing Shu, Maohan Liang

    Published 2024-01-01
    “…Therefore, trajectory compression has been one of the hot spots in research on trajectory data mining. …”
    Get full text
    Article
  6. 766

    Black Orpheus by Hlonipha Mokoena

    Published 2022-06-01
    “…As a continent, we are absented from the volatile and deadly politics of that fateful period from 1945 to 1989. As many have pointed out, contrary to the popular perception that Africa was untouched by Cold War politics, the period was actually one of “hot wars” all over the continent. …”
    Get full text
    Article
  7. 767

    Unveiling the role of knowledge management effectiveness in university's performance through administrative departments’ innovation by Abu Elnasr E. Sobaih, Hassane Gharbi, Mohamed A. Ben Abdallah, Osama H. Mahmoud Hassan

    Published 2025-03-01
    “…The issue of knowledge management has become a growing concern and hot topic for management research, especially in organisations like universities, where knowledge creation and management is essential. …”
    Get full text
    Article
  8. 768

    Assessment of Vegetation Temperature Status (VTCI) for monitoring drought in the watershed of Lake Urmia by using MODIS satellite imagery by Adel Nabi Zadeh Balkhanloo, zahra hejazizadeh, Parviz zeaiean Firoozabadi

    Published 2018-03-01
    “…Continuous decline in Lake Urmia water levels In recent years, the decline of rainfall and river flows and constant droughts has become the main concern of the people and the people. …”
    Get full text
    Article
  9. 769

    Novel Insight into the Modulatory Effect of Traditional Chinese Medicine on Cerebral Ischemia-Reperfusion Injury by Targeting Gut Microbiota: A Review by Ren Y, Chen G, Hong Y, Wang Q, Lan B, Huang Z

    Published 2025-01-01
    “…Notably, the effect of TCM on CIRI by regulating gut microbiota and maintaining gastrointestinal homeostasis has gradually become a hot topic. This review summarizes the functional role of the gut microbiota in the development and progression of CIRI and the therapeutic effects of TCM on CIRI by improving gut microbiota dysbiosis, affecting gut microbiota metabolism, and maintaining host immunity. …”
    Get full text
    Article
  10. 770

    Spatial-Temporal Variation of Population Aging: A Case Study of China’s Liaoning Province by Dunyi Guan, Lei Lei, Zenglin Han

    Published 2020-01-01
    “…With the rapid increase of the aging population in China, research on the aging phenomenon has become critical. Studying population aging from a spatial perspective is of vital practical significance. …”
    Get full text
    Article
  11. 771

    Morphoagronomic and Phenological Characteristics of Roselle (Hibiscus sabdariffa L.) Grown in Sudano-Sahelian Zone of Cameroon by Taffo Junior Baudoin Wouokoue, Francois Romain Fouelefack, Nguenjou Carole Leticia Liejip, Wanchebe Eleonore Biakdjolbo, Tchinda Elodie Mafouo

    Published 2025-01-01
    “…Hibiscus sabdariffa (HS) is a plant that has been used traditionally as a food in the preparation of herbal drinks, hot and cold beverages. …”
    Get full text
    Article
  12. 772

    Three-Dimensional Diffusion Model in Sports Dance Video Human Skeleton Detection and Extraction by Zhi Li

    Published 2021-01-01
    “…It is pointed out that the reorganization problem of discrete skeleton points in multiperson scenes is an NP-Hard problem, which can be simplified by decomposing it into a set of subproblems of bipartite graph matching, thus proposing a matching algorithm for discrete skeleton points and optimizing it for the skeleton dislocation and algorithm problems of human occlusion. …”
    Get full text
    Article
  13. 773

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  14. 774

    The Numerical Simulation of the Transient Plane Heat Source Method to Measure the Thermophysical Properties of Materials by Jianyuan Sun, Siwen Zhang, Pengcheng Shi, Zao Yi, Yougen Yi, Qingdong Zeng

    Published 2025-01-01
    “…The transient plane heat source method (TPS), also known as the hot disc method, is an experimental method for determining the thermal transport properties of materials. …”
    Get full text
    Article
  15. 775

    Chemical Fingerprint and Metabolic Profile Analysis of Tianshu Tablets by Ultra-High Performance Liquid Chromatography/Quadrupole-Time of Flight Mass Spectrometry by Lin Chen, Renhao Chen, Hui Ouyang, Qi Wang, Zhifeng Li, Yulin Feng, Shilin Yang

    Published 2019-01-01
    “…In recent years, the chemical fingerprinting of traditional Chinese medicines and the metabolites in these compounds has been a hot topic. In the present study, the chemical fingerprint of Tianshu tablets (TST) and the metabolic characteristics of compounds in rats after intragastric administration were studied by ultra-high performance liquid chromatography coupled with quadrupole-time of flight mass spectrometry (UPLC/Q-TOF MS). …”
    Get full text
    Article
  16. 776

    A Review of Climate Change and Mosquito Ecology in Constructed Wetlands: Implications for Urban Sustainability and Public Health by Bin Abd Rahim Muhamad Syafiq, Saad Noor Aida, Genasan Veera Singham A/L K., Weng Goh Hui, Kamal Nurul Hana Mokhtar, Shaharuddin Syafiq Bin

    Published 2024-01-01
    “…As temperatures continue to rise, the geographical distribution of mosquito species is shifting. or instance, Anopheles stephensi, a known malaria vector, has spread from its original habitats in Asia and the Middle East into parts of Africa. …”
    Get full text
    Article
  17. 777

    Interfacial structure and strengthening mechanisms of NiO-coated graphene reinforced aluminum matrix composites by Xin Gao, Dong Ai, Jiahao Zhang, Hongyan Yue, Xiaohua Zhang, Chunyu Zhang, Zhongkai Zhang, Jing Chang

    Published 2025-03-01
    “…Compared to pure Al, the composite's ultimate tensile strength has increased by 66% (143.1 ± 2.3 MPa). Theoretical modeling analysis indicates that the primary enhancements in the NiO@rGO/Al composite material stem from load transfer and interface thermal mismatch.…”
    Get full text
    Article
  18. 778

    Purification, characterization and hypoglycemic activity of glycoproteins obtained from pea (Pisum sativum L.) by Gaoyixin Qin, Wu Xu, Junping Liu, Liyan Zhao, Guitang Chen

    Published 2021-05-01
    “…The crude pea glycoproteins (PGP) were extracted by hot water and purified by diethylaminoethyl (DEAE)-Sepharose chromatography and Sephadex G-100 size-exclusion chromatography in sequence. …”
    Get full text
    Article
  19. 779

    Research progress in integrated groundwater-surface water models by Shuyan PENG, Zheng LU, Tingting WU, Xiaofan YANG

    Published 2024-11-01
    “…It is a crucial component of the hydrological cycle which has become a hot issue in hydrogeology in recent years. …”
    Get full text
    Article
  20. 780

    Application of Quantum Recurrent Neural Network in Low-Resource Language Text Classification by Wenbin Yu, Lei Yin, Chengjun Zhang, Yadang Chen, Alex X. Liu

    Published 2024-01-01
    “…Text sentiment analysis is an important task in natural language processing and has always been a hot research topic. However, in low-resource regions such as South Asia, where languages like Bengali are widely used, the research interest is relatively low compared to high-resource regions due to limited computational resources, flexible word order, and high inflectional nature of the language. …”
    Get full text
    Article