Showing 11,441 - 11,460 results of 63,767 for search '"TIME"', query time: 0.18s Refine Results
  1. 11441

    FDA-MIMO Beampattern Synthesis with an Analytical Method by Changlin Zhou, Chunyang Wang, Jian Gong, Ming Tan, Yingjian Zhao, Mingjie Liu

    Published 2021-01-01
    “…However, on the basis of fully understanding the time parameters, the relationship between the array element frequency offset and the beampattern performance still needs to be clarified. …”
    Get full text
    Article
  2. 11442

    Documentary film politics and the politics of documentary film by Lieza Louw

    Published 2022-10-01
    “… This paper sets out to consider the production of political documentary films in post-apartheid South Africa at a time when massification of the media and state capture of the South African Broadcasting Corporation, the country’s public broadcaster, silenced oppositional voices. …”
    Get full text
    Article
  3. 11443

    A Critique on the Book Pre-Islamic Sculpture and Iconography in Iran by Alireza Taheri, Samira Nasr Esfahani

    Published 2021-10-01
    “…Each of these works had its own consumption and special application according to human needs at the same time and the changes in attitude, religion, beliefs, and daily life of the time made the figurines with different coverings, arrangements, decorations, exaggerations, and accents. …”
    Get full text
    Article
  4. 11444

    Dynamics between FinTech and financial market: Supply-driven or Demand-guided? by Zekai Tu, Runze Yang, Cunyi Yang

    Published 2024-10-01
    “…This paper examined the dynamic relationship between FinTech development and financial development using the time-varying parameter structural vector autoregression (TVP-SV-VAR) model to analyze their impulse response relationship. …”
    Get full text
    Article
  5. 11445

    Hip Fracture. A Nine-Year Study. by Horacio Suárez Monzón, Rolando Delgado Figueredo, Eduardo Sarmiento Sánchez, Juan Carlos Cabrera Suárez

    Published 2007-08-01
    “…Variable such as age, sex, and topographical diagnosis, and surgical modality, scale of disability, comorbidity, complications, lethality, and second time of admission were taken into account and collected in the analyzed period of time and in specific clinical records elaborated for this purpose. …”
    Get full text
    Article
  6. 11446

    Structural integrity analysis of the pre-stressed concrete dome of the Belgrade fair hall 1 by Mirjana Jelic, Aleksandar Sedmak, Boris Folic, Simon Sedmak, Mihajlo Arandjelovic, Radomir Folic, Dorin Radu

    Published 2024-01-01
    “…In this paper the Finite Element Method (FEM) was performed to analyze different loading and supporting conditions. At the same time, crack growth in a support column was simulated by the extended FEM (XFEM). …”
    Get full text
    Article
  7. 11447

    Instantaneous Impact Point Guidance with Coast Arcs for Solid Rockets by Shengwei Jia, Fugui Li, Mingbo Tong

    Published 2021-01-01
    “…In terms of the “Hohmann transfer” principle, a pointing algorithm is deduced in depth to establish the theoretical relations among the ignition time, the required velocity vector, and the orbital element constraints and provides the analytical expression of the ignition time. …”
    Get full text
    Article
  8. 11448

    ‘Avoidance Preening’, Displacement Behavior and Co-Dependency in Professional Team Sport: When Wants Become More Important Than Needs by Blake D. McLean, Donnie S. Strack, David T. Martin

    Published 2022-08-01
    “…In the professional era, over utilization of resources, in pursuit of physical optimization, can detract from time spent on priorities. Athletes’ non-strategic, time-demanding focus on physical preparation/treatments resembles avian ‘avoidance preening’, whereby stressful situations trigger birds to excessively preen in place of more productive activities. …”
    Get full text
    Article
  9. 11449

    Quality of Service Comparison of DSDV and DSR Routing Protocols for V2V Communication in VANET by ketut bayu yogha bintoro, Muhammad Wildan Mukholladun

    Published 2024-12-01
    “…These findings underscore the importance of matching routing protocols to the specific requirements of V2V applications, such as real-time data exchange or traffic safety, to ensure informed decision-making. …”
    Get full text
    Article
  10. 11450

    The Influence of the Chemistry of an Organosilica Surface on the Adsorption of Proteins from Water—Salt Solutions by T.I. Denisova, G.F. Karpenko, T.A. Khalyavka, D.I. Shvetz

    Published 1999-03-01
    “…It has been shown that the principal surface chemical features of the organosilica which influence the adsorption of protein molecules on its surface are the ratio of alternating hydrophilic and hydrophobic groups present, the ampholitic character of the silanol groups, the pH value of the point of zero charge (pzc), the pH of the medium, the concentration of the modifying reagent (Cu π ion) employed, the contact time and the solid/liquid phase ratio of the system. …”
    Get full text
    Article
  11. 11451

    Determining the Factors of Social Phobia Levels of University Students: A Logistic Regression Analysis by Hamit Ozen

    Published 2016-01-01
    “…In respect to Odds rates, the most crucial factor about PEF of students is the time spent daily on the internet. Students who spend their time on the internet have PEF 2.4 times more than those who do not. …”
    Get full text
    Article
  12. 11452

    Multipath inter-domain routing for named data networking by Xiao-yan HU, Jian GONG

    Published 2015-10-01
    “…To facilitate content retrieval among NDN domains,a multipath inter-domain routing for named data networking(MIRNDN)was proposed.Under MIRNDN,an AS(autonomous system)maintained merely the routing state of content reachable from its own network or from its customers’ networks and aggregated routing information to mitigate routing scalability issue; “valley free”routing policy was applied to guide Interest packets that solicit content unreachable from the AS’s own network nor from its customers’ networks to explore matching data packets via multiple paths,and NDN’s requests aggregation,in-network caching and adaptive forwarding optimized such exploration; the reachability information of content from multiple paths was collected to support Interest multipath forwarding.The properties of FIB size and the convergence time and communication cost of routing update under MIRNDN were analyzed in theory.The experimental results in the AS level topology of current Internet validates that MIRNDN mitigates the scalability issue of NDN inter-domain routing,has relative short convergence time and moderate communication cost for routing update,and effectively reduces unnecessary Interest forwarding.…”
    Get full text
    Article
  13. 11453

    Machine learning mathematical models for incidence estimation during pandemics. by Oscar Fajardo-Fontiveros, Mattia Mattei, Giulio Burgio, Clara Granell, Sergio Gómez, Alex Arenas, Marta Sales-Pardo, Roger Guimerà

    Published 2024-12-01
    “…Here, we propose a machine learning approach to estimate the incidence of a pandemic in real-time, using reported cases and the overall test rate. …”
    Get full text
    Article
  14. 11454

    Detection for Dangerous Goods Vehicles in Expressway Service Station Based on Surveillance Videos by Kai Huang, Qinpei Zhao

    Published 2021-01-01
    “…Finally, we mark the detection result in the aerial view surveillance model and then use that model to monitor the service station in real time. Experiments show that our aerial view surveillance model can achieve the real-time detection of dangerous goods vehicles in the main areas of the service station, thereby effectively reducing the workload of the monitoring personnel.…”
    Get full text
    Article
  15. 11455

    Detection method of LDoS attack based on ACK serial number step-length by Zhijun WU, Qingbo PAN, Meng YUE

    Published 2018-07-01
    “…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
    Get full text
    Article
  16. 11456

    BOLD Noise Assumptions in fMRI by Alle Meije Wink, Jos B. T. M. Roerdink

    Published 2006-01-01
    “…Subtracting a resting-state time series from the first results in symmetric and nearly Gaussian noise. …”
    Get full text
    Article
  17. 11457

    DS+: Reliable Distributed Snapshot Algorithm for Wireless Sensor Networks by Gamze Uslu, Kemal Cagri Serdaroglu, Sebnem Baydere

    Published 2013-01-01
    “…We analyzed the performance of the algorithm in terms of snapshot success ratio and response time in simulation and experimental small test bed environment. …”
    Get full text
    Article
  18. 11458

    Accurate Finite Element Modeling Method of Herringbone Gear based on Multipoint Constraint Method by Guanwang Geng, Wei Liu, Qingsong Zhang

    Published 2022-01-01
    “…While ensuring the accuracy of finite element analysis results,it is one of the hot research issues to reduce the solution time and the requirements on computer performance. …”
    Get full text
    Article
  19. 11459

    Judith Rebecca von Wrbna and Maria Sophia von Dietrichstein: Two Imperial Ambassadresses from the Kingdom of Bohemia at the Court of Madrid (1653–1674) by Laura Oliván Santaliestra

    Published 2017-02-01
    “… This article focuses on the diplomatic activity of two ambassadors’s wives from the Kingdom of Bohemia at the court of Madrid between (1653–1674). In that time, the spouse of a diplomat was called “ambassadress”. …”
    Get full text
    Article
  20. 11460

    Risk Intelligence: Making Profit from Uncertainty in Data Processing System by Si Zheng, Xiangke Liao, Xiaodong Liu

    Published 2014-01-01
    “…Proactive fault tolerance scheme (such as the speculative execution in MapReduce framework) is introduced to dramatically improve the response time of job executions when the failure becomes a norm rather than an exception. …”
    Get full text
    Article