Browsing by Title
Now showing items 19755-19774 of 24237
-
Second-order adjoints by source code manipulation of numerical programs
(RWTH Aachen, 2007)The analysis and modification of numerical programs in the context of generating and optimizing adjoint code automatically probably ranges among the technically and theoretically most challenging source transformation ... -
Second-order OTA-C filters using a single OTA
(2005)A new voltage-mode second-order low pass OTA-C filter is proposed. The filter is integrator-based and uses only one OTA and two grounded capacitors. A multiple-input operational transconductance amplifier (OTA) for the ... -
Second-Order Sliding Mode Control of Wind Turbines to Enhance the Fault-Ride Through Capability Under Unbalanced Grid Faults
(2021-04-19)The integration of wind generation to the grid is growing rapidly across the world. As a result, grid operators have introduced the so-called grid codes (GC), which nowadays include a range of technical conditions and ... -
A secondary analyses of Bradac et al. s prototype process-monitoring experiment
(University of Hertfordshire, 2003)We report on the secondary analyses of some conjectures and empirical evidence presented in Bradac et al. s prototype process-monitoring experiment, published previously in IEEE Transactions on Software Engineering. We ... -
Secondary Neoplasms of the Urinary Bladder-Clinical Management and Oncological Outcomes
(2021-06-01)Background: Secondary neoplasms of the bladder account for 4.5% of all bladder neoplasms however there is limited literature reporting management and survival. This is the largest single centre series presented in current ... -
Section Editorial - Cosmeceuticals
(2014-04-14) -
Section editorial - Regulatory and toxicology
(2014-04-14) -
Secular Changes in Clinical Features at Presentation of Rheumatoid Arthritis : Increase in Comorbidity But Improved Inflammatory States
(2017-01-31)Objective: To examine secular trends in demographics, clinical manifestations, and comorbidity on first presentation of rheumatoid arthritis (RA) prior to disease-modifying antirheumatic drug treatment. Methods: A total ... -
Secular changes in the progression of clinical markers and patient-reported outcomes in early rheumatoid arthritis
(2020-01-03)OBJECTIVES: To examine secular trends in the progression of clinical and patient-reported outcomes in early RA. METHODS: A total of 2701 patients recruited to the Early Rheumatoid Arthritis Study or Early Rheumatoid Arthritis ... -
Secular trends in under-reporting in young people
(2005)National survey data show that reported energy intake has decreased in recent decades despite a rise in the prevalence of obesity. This disparity may be due to a secular increase in under-reporting or a quantitatively ... -
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System †
(2022-10-28)Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a common approach to smart city solutions that ... -
Secure Energy-Efficient Multi-RIS-aided SWIPT Networks
(Institute of Electrical and Electronics Engineers (IEEE), 2023-11-30)This paper considers a SWIPT network in which an access point (AP) serves multiple information decoding receivers(IDRs) and energy harvesting receivers (EHRs) assisted by several dynamically controlled reconfigurable ... -
The SECURE project – Stem canker of oilseed rape: : molecular methods and mathematical modelling to deploy durable resistance
(2007-03-26)Modelling done during the SECURE project has demonstrated the dynamic nature of the interaction between phoma stem canker (Leptosphaeria maculans), the oilseed rape host (Brassica napus) and the environment. Experiments ... -
Secure Sessions from Weak Secrets
(2005)Sometimes two parties who already share a weak secret k such as a password wish to share also a strong secret s such as a session key without revealing information about k to an active attacker. We assume that both parties ... -
Securing graduate commitment: an exploration of the comparative expectations of placement students, graduate recruits and Human Resource Managers within the Hospitality, Leisure and Tourism industries
(2001)This research begins the process of mapping out human resource (HR) strategies appropriate to the needs of actual and potential graduate employees. The perceptions and attitudes of placement students, recent graduates ... -
Securing the Edges of IoT Networks: a Scalable SIP DDoS Defense Framework with VNF, SDN, and Blockchain
(2021-02-19)An unintended consequence of the global deployment of IoT devices is that they provide a fertile breeding ground for IoT botnets. An adversary can take advantage of an IoT botnet to launch DDoS attacks against telecommunication ... -
Security and Usability of Authentication by Challenge Questions in Online Examination
(2017-05-12)Online examinations are an integral component of many online learning environments and a high-stake process for students, teachers and educational institutions. They are the target of many security threats, including ...