Showing 301 - 320 results of 628 for search '"At the Hop"', query time: 0.05s Refine Results
  1. 301

    ỨNG DỤNG PHƯƠNG PHÁP ĐỊNH GIÁ QUYỀN CHỌN VÀO XÁC ĐỊNH TỈ LỆ GIA TRỌNG TRONG TÍNH TOÁN CHI PHÍ VỐN CÓ GIA TRỌNG (WACC) by Nguyễn Thanh Hồng Ân

    Published 2012-11-01
    “…Từ đó, ta có thể tính chính xác hơn gia trọng cho từng loại nguồn vốn trong cấu trúc vốn để tính lãi suất WACC thích hợp.…”
    Get full text
    Article
  2. 302

    Load Balancing for Integrated Access and Backhaul in mmWave Small Cells by Quang-Huy Tran, Tho-Minh Duong, Sungoh Kwon

    Published 2023-01-01
    “…Multi-hop transmission and spectrum sharing between access and backhaul links cause an unbalanced load across BSs under IAB. …”
    Get full text
    Article
  3. 303

    The Effect of Six Weeks of Core Stability Training on Balance and Performance Improvement Among Male Taekwondo Athletes by Ebrahim Ebrahimi, Somayeh Mozafari

    Published 2024-08-01
    “…Participants were selected based on judgment sampling and randomly divided into two groups of 15 each. The single-hop test and triple-hop test were used to assess performance, while the Y balance test evaluated balance. …”
    Get full text
    Article
  4. 304

    Rehabilitation Following ACL Repair with Internal Brace Ligament Augmentation in Female Gymnast: A Resident’s Case Report by Colten Haack, Giorgio Zeppieri, Micheal W Moser

    Published 2024-06-01
    “…Additionally, strength and hop performance surpassed established thresholds of clinical significance. …”
    Get full text
    Article
  5. 305
  6. 306

    Research and design of the protection scheme on bluetooth location privacy by YU Bin, ZHANG Shun

    Published 2011-01-01
    “…The attack mechanism of bluetooth location privacy and the disadvantages of the current protection scheme were analyzed and a model of hierarchical address was established.On the basis of the model,a protection scheme on bluetooth location privacy was designed.Compared with others,this scheme can not only resist eavesdroping,replay attack,frequency hop sequence attack,conversation address tracking attack,dictionary attack and man in the middle attack,but also need little computing and storage.…”
    Get full text
    Article
  7. 307

    ĐẠI THẮNG MÙA XUÂN 1975 – THẮNG LỢI CỦA ĐƯỜNG LỐI GIƯƠNG CAO NGỌN CỜ ĐỘC LẬP DÂN TỘC VÀ CHỦ NGHĨA XÃ HỘI by Nguyễn Trường Sơn

    Published 2015-09-01
    “…Đảng ta đã kết hợp và phát huy cao độ sức mạnh dân tộc với sức mạnh thời đại, sức mạnh trong nước với sức mạnh quốc tế, tiềm năng của đất nước, của dân tộc với sự ủng hộ mạnh mẽ, sâu rộng của bầu bạn khắp năm Châu đối với cuộc chiến tranh chính nghĩa của nhân dân ta. …”
    Get full text
    Article
  8. 308

    Developing a Fire Monitoring System Based on MQTT, ESP-NOW, and a REM in Industrial Environments by Miracle Udurume, Taewoong Hwang, Raihan Uddin, Toufiq Aziz, Insoo Koo

    Published 2025-01-01
    “…This paper presents a fire monitoring system utilizing lightweight communication protocols, a multi-hop wireless network, and anomaly detection techniques. …”
    Get full text
    Article
  9. 309

    Correlation Between Y-Balance Test and Balance, Functional Performance, and Outcome Measures in Patients Following ACL Reconstruction by Jin Seong Kim, Ui Jae Hwang, Moon Young Choi, Doo Hwan Kong, Kyu Sung Chung, Jeong Ku Ha, Oh Yun Kwon

    Published 2022-02-01
    “…All the YBT scores had significant weak to moderate correlations with the single leg hop test and single leg vertical jump test scores: YBT-anterior (r = 0.303, r = 0.258), YBT-posteromedial (r = 0.475, r = 0.412), YBT-posterolateral (r = 0.525, r = 0.377), and YBT-composite (r = 0.520, r = 0.412)…”
    Get full text
    Article
  10. 310

    MESH NETWORK SIMULATION by Pei Ping, Yury N. Petrenko

    Published 2015-10-01
    “…Finally the experimental result gave us the information that mesh networks have different principle in transmission way with cellular networks in transmission, and multi – hop routing could provide robustness and load balancing to communication in wireless mesh networks.…”
    Get full text
    Article
  11. 311

    Cognitive radio frequency sense solution based on tracing location by WANG Yi-ming, ZHOU Liu-lei

    Published 2010-01-01
    “…A frequency sense solution based on the double-station cooperation and multi-hop tracing localization was presented for resolving the hidden and exposed problems in the dynamic spectrum resource management so as to improve reliability and efficiency of the frequency sense and increase the utilization of spectrum.In this scheme,the secondary user could detect primary user’s existing by an improved centroid localization algorithm cooperated with a known position user.The detailed steps were proposed,the simulation results were discussed and the performance of the tracing localization was analyzed.…”
    Get full text
    Article
  12. 312

    Distributed scheduling for real-time convergecast in wireless sensor networks

    Published 2007-01-01
    “…In some applications of wireless sensor networks,data packets generated by every node have to reach the sink node in short time.It resulted in a many-to-one communication paradigm referred to as convergecast.For the real-time of convergecast,a distributed scheduling algorithm was proposed.According to the algorithm,every node was scheduled by itself with information of one-hop range neighbor nodes.Some simulation and analysis prove that the algorithm can avoid data collisions,and the total number of timeslots needed to complete the convergecast once was around 1.6N to 1.8N,where N represents the number of nodes in the network.…”
    Get full text
    Article
  13. 313

    A DỊ HÌNH KÍCH THƯỚC GIỚI TÍNH VÀ SỬ DỤNG VI MÔI TRƯỜNG SỐNG CỦA LOÀI ẾCH BÁM ĐÁ Amolops ricketti group (Anura, Ranidae) Ở VƯỜN QUỐC GIA BẠCH MÃ, TỈNH THỪA THIÊN HUẾ... by Đức Lợi

    Published 2024-09-01
    “…Chúng tôi đã quan sát các tập tính của loài này trong quá trình thực địa tại Vườn Quốc gia Bạch Mã kết hợp với việc phân tích các đặc điểm hình thái trong phòng thí nghiệm. …”
    Get full text
    Article
  14. 314

    Utilizing physical educators to monitor muscular strength and neuromuscular control among children with varied recess time by G. Kate Webb, Yan Zhang, Deborah J. Rhea

    Published 2025-02-01
    “…ANCOVAs were run for group differences at Time 2 while controlling for Time 1.ResultsIntervention children significantly outperformed control children on the single leg 3-hop muscular strength test F(1,105) = 13.1, p < .001, n2 = .05, and the neuromuscular control side-step test F(1,105) = 4.77, p = .03, n2 = .04. …”
    Get full text
    Article
  15. 315

    Comparative analysis of land-based vs. water-based balance training on quality of life and physical and psychological deficits in athletes with chronic ankle instability: a randomi... by Aynollah Naderi, Khadije Ahi

    Published 2025-01-01
    “…Assessments before and after the interventions included functional ankle instability (CAIT), kinesiophobia (TSK-17), quality of life (SF-36), dynamic postural control (Y Balance Test), and functional performance (Figure-8 hop and single-limb side-hop tests). Perceived treatment effects were measured using the Global Rating of Change (GROC) post-intervention. …”
    Get full text
    Article
  16. 316

    Relationship Between Single-Leg Vertical Jump and Drop Jump Performance, and Return to Sports After Primary Anterior Cruciate Ligament Reconstruction Using Hamstring Graft by Shunsuke Ohji, Junya Aizawa, Kenji Hirohata, Takehiro Ohmi, Tomoko Kawasaki, Hideyuki Koga, Kazuyoshi Yagishita

    Published 2024-10-01
    “…# Background After anterior cruciate ligament reconstruction (ACLR), asymmetry is likely to persist in single-leg (SL) vertical jump and drop jump performance than in SL hop distance. However, its relationship with the return to sport (RTS) remains unclear…”
    Get full text
    Article
  17. 317

    Capacity effectiveness of multihop cellular based aggregation network model by TU Lai, WANG Fu-rong, ZHANG Jian, ZHANG Fan

    Published 2008-01-01
    “…Comparison was made by both analysis and numeric simu- lation among the capacity regions and unified capacities of three network models: traditional single-hop cellular network, multihop cellular network and aggregation supported multihop cellular. …”
    Get full text
    Article
  18. 318

    Improved Epidemic algorithm based on trust mechanism in opportunistic networks by Guang-hua ZHANG, Shao-bo PANG, Yao-hong YANG, Zhen-guo CHEN

    Published 2017-08-01
    “…Aiming at the problem of routing reliability caused by Epidemic algorithm,an improved Epidemic algorithm based on trust mechanism was proposed.Through the establishment of trust mechanism between nodes,this mechanism can provide sufficient trusted nodes as the next hop node of message forwarding,and can promote that the Epidemic algorithm performs the limited scope of flooding under the constraint of trust mechanism.Simulation results and analysis show that the improved Epidemic algorithm can avoid the network congestion caused by flooding mechanism,and the reliability of routing and transmission performance are improved to some extent.…”
    Get full text
    Article
  19. 319

    CON ĐƯỜNG CÁCH TÂN THƠ CỦA HÀN MẶC TỬ by Trần Thị Tuân

    Published 2014-09-01
    “…Bài báo tìm hiểu và kiến giải thơ Hàn Mặc Tử từ Đường luật đến thơ Mới lãng mạn với bút pháp tự do phóng túng, kết hợp với việc sử dụng yếu tố tượng trưng, siêu thực. …”
    Get full text
    Article
  20. 320

    Mobile detection of replication attacks in wireless sensor network by Xiang-yi CHEN, Liang-min WANG, Yong-zhao ZHAN

    Published 2012-09-01
    “…The detection schemes proposed so far are not satisfactory because they are energy and memory demanding,not suit for use in resource-constrained wireless sensor networks.the detection of replica attack was focused on in WSN.from the intuition that mobility,in conjunction with the one-hop sensor node’s communication,helps detect the replica attack globally.Then,propose a mobile detection method to detect the replica attack.Analysis and simulations result show that the our method helps to detect replica attacks effectively and efficiently,with a small and well-balanced overhead in the network.…”
    Get full text
    Article