Showing 11,541 - 11,560 results of 63,767 for search '"TIME"', query time: 0.19s Refine Results
  1. 11541

    Praktikeres risikovurderinger: brugen af risikofaktorer i forebyggelsen af ungdomskriminalitet by Morten Ejrnæs, Merete Monrad

    Published 2020-06-01
    “…However, there has not been a focus on how practitioners actually estimate the risk of a young person being apprehended as a first-time offender. We study practitioners’ risk assessments through three vignettes. …”
    Get full text
    Article
  2. 11542

    Multiagent Routing Simulation with Partial Smart Vehicles Penetration by Bogumił Kamiński, Łukasz Kraiński, Atefeh Mashatan, Paweł Prałat, Przemysław Szufel

    Published 2020-01-01
    “…The goal of the paper is to analyze the effect of changing smart cars penetration on system characteristics, in particular, the total travelling time. The smart car routing algorithm proposed in this paper reduced travelling time up to 30%. …”
    Get full text
    Article
  3. 11543

    ANALYSIS OF TRANSIENT CLOSING PROCESS AND COLLISION RESPONSE OF SWING CHECK VALVE by ZHANG XiHeng, ZHANG SunLi, BAI YaZhou, ZHANG XiaoKang

    Published 2021-01-01
    “…Vortex phenomenon obvious occurs at the bottom of the valve flap,and there is a time difference in the change of fluid flow direction on the center line of the flow channel; In the process of collision and rebound,the peak stress appeared at the rounded corners of the back of the flap and the rocker rib,and the valve flap swings slightly and collides with the valve seat many times in a short time. …”
    Get full text
    Article
  4. 11544

    Enhancing Teacher Beliefs through an Inquiry-Based Professional Development Program by Tammy R. McKeown, Lisa M. Abrams, Patricia W. Slattum, Suzanne V. Kirk

    Published 2016-01-01
    “…Teacher beliefs were assessed at three time points, pre- post- and six months following the summer academy. …”
    Get full text
    Article
  5. 11545

    Upgrading of Resolution Elastic Neutron Scattering (RENS) by S. Magazù, F. Migliardo, M. T. Caccamo

    Published 2013-01-01
    “…In particular it is shown that the measured elastic scattering law as a function of the logarithm of the instrumental energy of resolution gives rise to an increasing sigmoid trend whose inflection point can be connected with the system relaxation time. The validity of the RENS approach is supported by a numerical simulation, taking into account a Gaussian resolution function and a Lorentzian scattering law, and experimentally by integrated EINS and QENS measurements performed as a function of temperature on three homologous disaccharide/water mixtures showing different relaxation times. …”
    Get full text
    Article
  6. 11546

    Efficient Bistatic SAR Raw Signal Simulator of Extended Scenes by Liang Yang, Weidong Yu, Shichao Zheng, Lei Zhang

    Published 2014-01-01
    “…And it is more efficient than the time domain one by making use of Fast Fourier Transform (FFT). …”
    Get full text
    Article
  7. 11547

    The concept of 'Russification' as understood by Professor P.V. Znamensky by T.M. Nekhorosheva

    Published 2022-06-01
    “…According to him, Russification meant that the peoples of the Russian Empire loved the state and the emperor and were loyal to the authorities. At the same time, with the Russians over time.…”
    Get full text
    Article
  8. 11548

    Constructing Functional Ionic Membrane Surface by Electrochemically Mediated Atom Transfer Radical Polymerization by Fen Ran, Dan Li, Jiayu Wu

    Published 2016-01-01
    “…The polymerization could be controlled by reaction condition, such as monomer concentration, electric potential, polymerization time, and modifier concentration. The membrane surface was uniform when the monomer concentration was 0.9 mol/L, the electric potential was −0.12 V, the polymerization time was 8 h, and the modifier concentration was 2 wt.%. …”
    Get full text
    Article
  9. 11549

    CHRISTOPANGANISM: A RELIGION IN SEARCH OF RELEVANCE OR A CONTEXTUALIZED CHRISTIANITY IN NIGERIA? by Amos Francis Dike

    Published 2023-08-01
    “…However, some contemporary Christians/pastors have an approach that can best be described as Christopaganism on order to bridge the gap created by western missionary exploit.Hence, while recognizing the existence of generational curses and magic, some Christian bodiesviews Christopaganismboth as a means of contextualizing Christianity and at the same time finding relevance. Thus, to retain the authentic Christianity in Africa that will at the same time have global relevance, African church should harmonize her beliefs and practices in line with the biblical Christianity. …”
    Get full text
    Article
  10. 11550

    ROLLER BEARING FAULT RECOGNITION METHOD BASED ON CYCLIC AUTOCORRELATION AND MULTI-DOMAIN KERNEL LIMIT LEARNING MACHINE by WANG XiaoHui, WANG GuangBing, XIANG JiaWei, HUANG Zhen, SUI GuangZhou

    Published 2020-01-01
    “…According to characteristics of the bearing signal,the second-order cyclic demodulation information was introduced into machine learning,and a multi-domain kernel extreme learning machine(MKELM) based on the combination of cyclic autocorrelation(CAF) frequency domain features and time domain features(TD) was proposed to accurately identify the bearing status.The algorithm constructed a CAF function based on the second-order cyclic characteristics of the bearing signal to extract the cyclic frequency domain features of the samples,then combined them with the time domain feature quantities of the samples.The matching factors of multi-domain feature vectors was designed to fuse TD and CAF feature vectors; finally,the fused CAF-TD sample features was input into the kernel extreme learning machine for cluster regression.The spindle bearing experimental results show that the cyclic frequency domain statistics extracted based on CAF can sensitively reflect the signal characteristics.Compared with the classic classifier,the CAF-TD multi-domain kernel extreme learning machine can extract more feature information from limited samples and obtain more accurate diagnostic result.…”
    Get full text
    Article
  11. 11551

    WDM Network and Multicasting Protocol Strategies by Pinar Kirci, Abdul Halim Zaim

    Published 2014-01-01
    “…The performance of the protocol is examined with Just Enough Time (JET) and Just In Time (JIT) reservation protocols. …”
    Get full text
    Article
  12. 11552

    Imaging methods in monitoring gout – a pictorial essay by Korzeń Maria, Nowakowska-Płaza Anna, Leszkiewicz Marek, Sudoł-Szopińska Iwona

    Published 2024-11-01
    “…During this period of time, radiographs, ultrasonography, and dualenergy computed tomography were performed several times, revealing severe progression of gout. …”
    Get full text
    Article
  13. 11553

    Comparative Effect of Crude and Commercial Enzyme on the Juice Recovery from Bael Fruit (Aegle marmelos Correa) Using Principal Component Analysis by Anurag Singh, H. K. Sharma, Sanjay Kumar, Ashutosh Upadhyay, K. P. Mishra

    Published 2013-01-01
    “…The effect of incubation time, incubation temperature, and crude enzyme concentration was observed on the yield, viscosity, and clarity of the juice obtained from bael fruit pulp. …”
    Get full text
    Article
  14. 11554

    Surgical acute abdomen in elderly patients. by Itengré Ouédraogo, Julio Pablo Miñoso Andina, Angel Delfín Rodríguez Sarria, Lidia Torres Ajá

    Published 2004-08-01
    “…Postoperating complications in 47,06% of the patients appeared and was observed a mortality of 26,5% with statistically significant relation with the age, ASA classification, surgical risk, time of evolution and the surgical time. The peritonitis heads the direct causes of death.…”
    Get full text
    Article
  15. 11555

    The rise and fall of promises: a preliminary method to trace promises in science and technology by Stefan D. M. Gaillard, Sanda Hachana

    Published 2025-12-01
    “…Such methods would allow analysis of the literature to detect broken promises over time. To address this gap, we develop a method to trace promises over time using a training corpus of nanobiology documents. …”
    Get full text
    Article
  16. 11556

    Research on Access and Handover Authentication Mechanism of SpaceIntegrated-Ground Information Network for Multi-Type Terminals by Jin CAO, Lilan CHEN, Ruhui MA, Hui LI, Fenghua LI

    Published 2021-09-01
    “…With the maturity of the key technologies of the new spectrum of the network, the network can accommodate users of various frequency bands.In order to make eff ective use of resources, diff erentiated terminals need targeted and customized security protection mechanisms.In the unifi ed network architecture, three access authentication mechanisms were proposed for common terminals, high-speed terminals and Ka terminals.At the same time, in order to ensured that diff erent types of terminals could still obtain continuous network services after accessing the network, a switching authentication mechanism based on pre-switching was proposed to provided unifi ed security switching services for the three types of terminals.Formal verifi cation tool named Scyther and informal security analysis results showed that the proposed scheme meet a variety of security requirements of the proposed scenario.At the same time, compared with the same type schemes, the proposed scheme can achieve the eff ective balance between security and performance, which can meet multidimensional integration of heaven and earth network of the scene terminal access switch and certifi cation requirements.…”
    Get full text
    Article
  17. 11557

    Survey on data security and privacy-preserving for the research of edge computing by Jiale ZHANG, Yanchao ZHAO, Bing CHEN, Feng HU, Kun ZHU

    Published 2018-03-01
    “…With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.…”
    Get full text
    Article
  18. 11558

    UFIR Filtering for GPS-Based Tracking over WSNs with Delayed and Missing Data by Karen Uribe-Murcia, Yuriy S. Shmaliy, Jose A. Andrade-Lucio

    Published 2018-01-01
    “…The UFIR filter is developed for vehicle tracking in discrete-time state-space over wireless sensor networks (WSNs) with time-stamped data discretely delayed on k-step-lags and missing data. …”
    Get full text
    Article
  19. 11559

    Application of Low-Intensity Laser in the Treatment of Skeletal Muscle Injury in Runners by Youdong Chen, Qiang Li

    Published 2022-01-01
    “…In this article, a statistical method was used to obtain the gait cycle time (P & LT; 0.01) and support cycle time (slow P<0.01).…”
    Get full text
    Article
  20. 11560

    O cotidiano como utopia: novas relações de espaço e tempo no mundo da arte contemporânea by Ana Carolina Freire Accorsi Miranda

    Published 2017-01-01
    “…This type of art places itself as the utopia of the everyday life, constructed for the present time in the urban space. Thus, the focus of this paper is to make a brief theoreti- cal study on contemporaneity which points to important changes in the way in which individuals relate to everyday experience, narrative and memory, in order to understand the recent transformations in the world of contemporary art.…”
    Get full text
    Article