Results 241 to 250 of about 609,792 (293)

A shear-induced limit on bacterial surface adhesion in fluid flow. [PDF]

open access: yesProc Natl Acad Sci U S A
Yeo EF, Walker BJ, Pearce P, Dalwadi MP.
europepmc   +1 more source

Mathematical Analysis of Sessile Metapopulation Model (Functional Equations in Mathematical Models)

open access: yesMathematical Analysis of Sessile Metapopulation Model (Functional Equations in Mathematical Models)
openaire  

Mathematical Analysis of Cardiovascular Function

IEEE Transactions on Biomedical Engineering, 1985
This paper identifies several published models of cardiovascular function, and attempts to analyze them in terms of the physiological processes which are embedded in their structure. It appears that representative models have increased in size and complexity in direct proportion to increases in the power and suitability of available computing machinery.
openaire   +2 more sources

Mathematical tools for hazard function analysis

Journal of Mathematical Psychology, 2003
A hazard function is a characterization of the risk of an event occurring at a given point, conditioned by the fact that the event has not already occurred. Given the important role of the hazard functions in the mathematical psychology, the paper deals with mathematical techniques apt to prove several properties of hazard functions.
openaire   +2 more sources

Functional data analysis : children's mathematical development

2021
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT AUTHOR'S REQUEST.] Bailey et al. (2014) suggested that children's mathematical development is related more to trait characteristics than to prior mathematical development. However, their study analysis was designed to examine trait and state effects that did not vary flexibly across grades.
openaire   +2 more sources

Mathematical Modeling Analysis of Strong Physical Unclonable Functions

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020
Physical unclonable function (PUF) is a technique to produce secret keys or complete authentication in integrated circuits (ICs) by exploiting the uncontrollable randomness due to manufacturing process variations. For better PUF applications, efficient analysis of different designs is important.
Yunhao Xu   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy