Showing 11,001 - 11,020 results of 63,767 for search '"TIME"', query time: 0.20s Refine Results
  1. 11001

    Detection Algorithm of Tennis Serve Mistakes Based on Feature Point Trajectory by Hongxin Tang

    Published 2022-01-01
    “…The results of simulations demonstrate that the aforementioned algorithm improves real-time performance and accuracy, and that it can accurately track players’ visual edge information feature points while they are serving, conduct real-time evaluation and guidance via an expert system, effectively correct the tennis serving image path, and enhance your capacity for service.…”
    Get full text
    Article
  2. 11002

    Tamactún-Acalán: interpretación de una hegemonía política maya de los siglos xiv-xvi by Andrés Ciudad Ruiz, Alfonso Lacadena García-Gallo

    Published 2001-01-01
    “…The anthropological studies that analyze the political-territorial structure of the ancient Maya in Pre-columbian times usually highlight the existence of deep transformations between Classic and Post-classic periods. …”
    Get full text
    Article
  3. 11003

    Estimation of Some Biomarkers in Recovered COVID19 Patients by Abeer Ghazi Nazzal, Ahmed Ghazi Sabbar

    Published 2022-11-01
    “…The serum creatinine, Aspartate aminotransferase, Interlukin-24, prothrombin time, and fibrinogen were measured using different techniques. …”
    Get full text
    Article
  4. 11004

    Mechanism of Imprinting Process in the Ni-P Metallic Glass Films: A Molecular Dynamics Study by Tri Widodo Besar Riyadi, Ramaswamy Sivaraman, Alaa Mohammed Hussein Wais, Farag M. A. Altalbawy, Ulugbek Oybutaevich Khudanov, Dinesh Kumar Chaudhary

    Published 2023-01-01
    “…Moreover, it was determined that the imprinting at high temperature (700 K) led to the shortening of pattern filling time and the decrease of loading force in both geometries. …”
    Get full text
    Article
  5. 11005

    Cimitirele medievale de la Buftea–La Cârna/Mănești. O interpretare pe baza monedelor depuse în morminte by Morintz, A., Coman, M.

    Published 2024-09-01
    “…However, given the fact that the site was investigated in two distinct stages three decades apart, time bringing great changes in the theory and practice of archaeology, a reference system to report on the various specific aspects of both the earlier and the future research, a system perhaps vulnerable at the moment, but perfectible in time. …”
    Article
  6. 11006

    Application of Buoy Observations in Determining Characteristics of Several Typhoons Passing the East China Sea in August 2012 by Ningli Huang, Zheqing Fang, Fei Liu

    Published 2013-01-01
    “…The buoy-measured wind and pressure time series were also used to correct the intensity of “Damrey” initially determined by CMA.…”
    Get full text
    Article
  7. 11007

    Multiscale Tail Risk Connectedness of Global Stock Markets: A LASSO-Based Network Topology Approach by Yuting Du, Xu Zhang, Zhijing Ding, Xian Yang

    Published 2022-01-01
    “…In dynamic analysis, we use rolling window estimation and find that different frequencies identify distinct episodes of shocks, which provides us with the reason for the diverse risk centers at different time scales in static analysis. Our findings provide heterogeneous financial practitioners, regulators, and investors with diverse characteristics of stock markets under multiple time horizons and help them operate their own trading strategies.…”
    Get full text
    Article
  8. 11008

    Key path analysis method for large-scale industrial control network by Yaofang ZHANG, Zheyu ZHANG, Haikuo QU, Ge ZHANG, Zibo WANG, Bailing WANG

    Published 2021-12-01
    “…In order to solve the problem of high time-consuming and resource-consuming quantitative calculation of large-scale industrial control network attack graphs, a key path analysis method for large-scale industrial control networks was proposed.Firstly, the idea of cut set was used to calculate the key nodes set of Bayesian attack graph by combining the atomic attack income in industrial control network, which solved the problem that the current cut set algorithm only considers the key nodes in graph structure.Secondly, a dynamic updating strategy of Bayesian attack graph which only updated the attack probability of key nodes was proposed to efficiently calculate the attack probability of the whole graph and analyze the key path of attack graph.The experimental results show that the proposed method can not only ensure the reliability of the calculation results of large-scale industrial control attack graphs, but also can significantly reduce the time consumption and have a significant improvement in the calculation efficiency.…”
    Get full text
    Article
  9. 11009

    APPLICATION OF SVM METHOD IN FAULT DIAGNOSIS OF А MULTI-STAGE CENTRIFUGAL PUMP by LI YouGen, MA WenSheng, LI FangZhong, WANG QingFeng

    Published 2024-04-01
    “…High dimensional feature samples were constructed by extracting time-frequeney domain characteristies of vibration signal with ensemble empirical mode decomposition(EEMD). combined with characteristies of time domain, frequeney domain and information entropy. …”
    Get full text
    Article
  10. 11010

    A Game Theoretical Approach for Solving Winner Determination Problems by Chen-Kun Tsung, Hann-Jang Ho, Sing-Ling Lee

    Published 2014-01-01
    “…Moreover, reasonable computation time is another advantage of applying the proposed algorithm to the real-world services.…”
    Get full text
    Article
  11. 11011

    Research on Dynamic Characteristics of the Engine Front-end Accessory Drive System by Zheng Guangze, Yan Pengyuan, Wu Yu, Li Xiaofeng

    Published 2024-03-01
    “…Considering the effects of time-varying load, time-varying excitation, longitudinal stiffness, radial stiffness and bending stiffness of each pulley, the dynamic analysis model of the inner and outer engine front-end accessory drive system is established by Simdrive software. …”
    Get full text
    Article
  12. 11012

    Within‐chain parallelization—Giving Stan Jet Fuel for population modeling in pharmacometrics by Casey Davis, Pavan Vaddady

    Published 2025-01-01
    “…However, MCMC is computationally expensive and can be time‐consuming, enough so that people will often forgo Bayesian methods for a more traditional approach. …”
    Get full text
    Article
  13. 11013

    Theory and Experiment Research of Transmission Efficiency of Split-power Internal Parallel Moving Gear Transmission by Zhao Ziqiang, Yin Xuebin, Wang Wenzhong

    Published 2018-01-01
    “…The efficiency test bench of the SIPMGTD prototype is set up,the real-time efficiency monitoring software of the experiment platform is compiled,and the real-time monitoring system of efficiency is constructed. …”
    Get full text
    Article
  14. 11014

    Suggested terms and definitions in photocatalysis and radiocatalysis by N. Serpone, A. V. Emeline

    Published 2002-01-01
    “…The terms and definitions will no doubt need to be revisited from time to time as the fields of photocatalysis and radiocatalysis progress and new discoveries reported. …”
    Get full text
    Article
  15. 11015

    Partial fanout multicast switching model of reconfigurable foundation network by Bo ZHANG, Bin-qiang WANG, Sheng-ping ZHU

    Published 2012-05-01
    “…The multicast switching model using copying before scheduling and fanout copying modes had worse large-scale extensibility capability in traditional technology system.A partial fanout multicast switching model with basic switching fabric comprised by 2×2 Boolean cells and Boolean group concentrators was proposed facing to reconfigurable foundation network.Self-routing path selected was realized by partial fanout copying mode and quaternary symbols cut-through coding.Unicast blocking probability,multicast blocking probability and multicast fanout ratio iterative course was deduced based on unicast and multicast mixed business source.The simulation result shows that the value of multicast blocking probability is from 10<sup>-10</sup> to 10<sup>-2</sup> based on Bernoulli uniform business source when normalized unicast load 0.2,the model can meet time QoS requirement because the value of multicast time delay is less than hundred nano-second level limit.…”
    Get full text
    Article
  16. 11016

    „Až sem přijde Adenauer, tak vy budete viset jako první!“, aneb ke specifikům trestného činu výtržnictví v socialistickém Československu by Milan Dobeš

    Published 2025-01-01
    “…For a better understanding of the legal regulation at that time, there are cases from the then-practice, which were handled by the District Court for Prague 1. …”
    Get full text
    Article
  17. 11017

    Minimum connected dominating set algorithm based on directed diffusion by LI Ke-qing, CHANG Jin-yi, WANG Jia-nian

    Published 2008-01-01
    “…Simulation results show that MCDSDD can save time and multiple covers hot spot in the surveillance area, and prolong the life time of the WSN.…”
    Get full text
    Article
  18. 11018

    Realization of Negative Group Delay Network Using Defected Microstrip Structure by Girdhari Chaudhary, Yongchae Jeong, Jongsik Lim

    Published 2014-01-01
    “…The signal attenuation characteristics of DMS were utilized to get NGD time. The group delay (GD) time and signal attenuation of the proposed networks are controlled by an external resistor connected across the DMS slot. …”
    Get full text
    Article
  19. 11019

    Application of Sports Clustering Deconstruction Based on Neural Network by Xiaobing Ma

    Published 2022-01-01
    “…However, due to various factors such as exercise time and course time conflict, this method cannot be widely used. …”
    Get full text
    Article
  20. 11020

    Effects of Quintessence Dark Energy on the Action Growth and Butterfly Velocity by Hossein Ghaffarnejad, Mohammad Farsam, Emad Yaraie

    Published 2020-01-01
    “…Then we try to find some conditions on the quintessence parameters where the Lloyd bound is satisfied in presence of affects of the quintessence dark energy on the complexity growth at the late time approximations. We compare late time approximation of the action growth by perturbed geometry in small limits of shift function. …”
    Get full text
    Article