Showing 1,121 - 1,140 results of 1,808 for search '"Windows"', query time: 0.04s Refine Results
  1. 1121

    Cardiac Tamponade from Purulent Pericarditis due to Cutibacterium acnes by Ardalon Farhat-Sabet, Robert Hull, Dustin Thomas

    Published 2018-01-01
    “…Initial stabilization and diagnosis were made via pericardiocentesis; afterward the patient underwent a pericardial window. Due to a severe penicillin allergy, he was successfully treated with a 14-day course of vancomycin. …”
    Get full text
    Article
  2. 1122

    SEVEN CHANNEL REZZPA UNIVERSAL JOINT STRESS ANALYSIS AND SIMULATION by XIE Kun, GUO ChangNing, YAN GongZhe, SHI BaoShu

    Published 2019-01-01
    “…Based on the force model of the ball in the cage type constant velocity universal joint,the expressions of the circumferential force of the groove on the steel ball,the normal contact force of the channel to the steel ball and the normal contact force of the cage window to the steel ball are deduced when the steel ball moves in the inner groove and the bell shaped outer channel of the star sleeve. …”
    Get full text
    Article
  3. 1123

    Pedestrian Motion Path Detection Method Based on Deep Learning and Foreground Detection by Meiman Li, Wenfu Xie

    Published 2021-01-01
    “…Experimental results show that the proposed method not only improves the practical application of pedestrian rerecognition but also reduces the detection range, computational complexity, and false detection rate compared with sliding window method.…”
    Get full text
    Article
  4. 1124

    Optimization of Urban Cold Chain Transport Routes under Time-Varying Network Conditions by Shouchen Liu, Cheng Zhang

    Published 2021-01-01
    “…Given the time-efficient characteristics of urban cold chain transportation and the time-varying characteristics of urban road speed, customers encounter the problem of limited vehicle path optimization due to a fuzzy time window. An optimization model of urban cold chain transportation with the objective function as the minimum total cost is constructed under the premise of service reliability, and an artificial immune particle swarm optimization algorithm is designed to solve the model. …”
    Get full text
    Article
  5. 1125

    Research of Surrogate Measure for Freeway Crashes Based on Tire Skid Marks by Yan Ma, Wenjing Huang, Zong Tian, Donghong Li, Hongzhou Cai, Jie Su

    Published 2021-01-01
    “…By collecting and analyzing the data based on selected arterial and freeway segments in the Reno-Sparks area in northern Nevada, a methodology was developed to categorize different tire skid marks. Sliding window and linear regression techniques were applied to determine any correlation between tire skid marks and crashes. …”
    Get full text
    Article
  6. 1126

    OPTICAL BISTABILITY IN A DEGENERATE TWO-LEVEL EIT MEDIUM UNDER THE INFLUENCE OF AN EXTERNAL MAGNETIC FIELD: AN ANALYTICAL APPROACH by Le Thi Minh Phuong, Dinh Xuan Khoa, Nguyen Huy Bang, Thai Doan Thanh, Nguyen Tuan Anh, Nguyen Thi Thu Hien, Hoang Minh Dong

    Published 2021-07-01
    “…By controlling the external magnetic field, we find that the appearance and disappearance of the optical bistability can be easily controlled according to the strength of the magnetic field in the transparent window domain. Furthermore, the effects of the intensity of the coupling laser field and the parameters of the system on the behavior of optical bistability are also considered. …”
    Get full text
    Article
  7. 1127

    A SNEAK PEEK INTO LIGETI'S MAILBOX: "IL ME FERA GRAND PLAISIR D’ÉCRIRE UN QUATUOR À CORDES POUR LES ARDITTI. MAIS QUAND? ..." by Bianca ŢIPLEA TEMEŞ

    Published 2014-12-01
    “…Remaining an unrealised dream, along with other works, such as the operas Alice's Adventures in Wonderland, The Tempest and the orchestra piece Labyrinth, the String Quartets Nos.3 and 4 represent a window into Ligeti’s laboratory, allowing us to glimpse, through fragmentary clues, the author’s secret ingredients, ideas and creative mechanisms. …”
    Get full text
    Article
  8. 1128

    Container intrusion detection method based on host system call frequency by Yimu JI, Weidong YANG, Kui LI, Shangdong LIU, Qiang LIU, Sisi SHAO, Shuai YOU, Naijiao HUANG

    Published 2021-08-01
    “…Container technology has become a widely used virtualization technology in cloud platform due to its lightweight virtualization characteristics.However, it shares the kernel with the host, so it has poor security and isolation, and is vulnerable to flood, denial of service, and escape attacks.In order to effectively detect whether the container is attacked or not, an intrusion detection method based on host system call frequency was proposed.This method took advantage of the different frequency of system call between different attack behaviors, collected the system call generated when the container was running, extracted the system call features by combining the sliding window and TF-IDF algorithm, and classified by comparing the feature similarity.The experimental results show that the detection rate of this method can reach 97%, and the false alarm rate is less than 4%.…”
    Get full text
    Article
  9. 1129

    Sub-topic detection and tracking based on dependency connection weights for vector space model by Xue-guang ZHOU, Fei GAO, Yan SUN

    Published 2013-08-01
    “…Aiming at the phenomenon that there are abrupt reports,similar topics and abundant levels of subtopics in the news,a novel method based on relationship analysis using dependent sentence pattern was proposed for sub-topic detection and tracking (sTDT),which constructed feature dimensions to generate the global vectors according to the increment of TF-IDF,and then created the partial adjoin map based on the connection weights within the time window and decreased the dimensions through dependent sentence pattern.Finally,a novel method for sTDT computing was built with adjoins dictionary weights and time threshold attenuation.Experiments show that the proposed method transferrs the text from linear to plane structure,and extracts the subtopics effectively,of which the minimum DET cost is reduced by at least 2.2 percent than that of classical methods.…”
    Get full text
    Article
  10. 1130

    OPTIMALISASI PENCAHAYAAN ALAMI GEDUNG PERPUSTAKAAN (STUDI KASUS: GEDUNG PERPUSTAKAAN UNIVERSITAS ISLAM NEGERI ALAUDDIN MAKASSAR) by Muh. Aryanugraha Ismajaya, Nurul Jamala B, Asniawaty

    Published 2023-12-01
    “…On the second floor, a centrally positioned light shelf with a 15° angle on each outer window opening yields the highest R2 value of 0.94. …”
    Get full text
    Article
  11. 1131

    Interplanting Secondary Crops into Existing Strawberry Fields. by John R. Duval, E. A. Golden, Alicia Whidden

    Published 2005-02-01
    “…An early start on secondary crops allows producers to take advantage of a marketing window when few other regions are producing. The most common secondary crops are squash, cantaloupe, pickles, and peppers. …”
    Get full text
    Article
  12. 1132

    Is it the End of the Ice Age? by Susan Y Kwiecien

    Published 2023-06-01
    “…When considering what is known about the injury cascade, the optimal application window for ice is in the immediate acute stage following injury to reduce the proliferation of secondary tissue damage that occurs in the hours after the initial injury. …”
    Get full text
    Article
  13. 1133

    Resource scheduling algorithm of satellite communication system for future multi-beam dense networking by Yuanzhi HE, Cong PENG, Jihong YU, Yun LIU

    Published 2021-04-01
    “…The resource scheduling problem of satellite communication systems under the condition of high-dynamic and resource limitation was studied.A resource scheduling model for satellite communication systems was established based on time window, energy consumption, number of channels, user priority and task suddenness.Considering the disadvantages of slow initial search speed and weak local search ability, the improved ant colony algorithm based on construction of initial solution set and extra pheromone deposition was proposed to solve the resource scheduling problem.The optimization characteristics of the number of completed tasks, priority and scheduling completion time were simulated and analyzed.The results show that the algorithm has a fast convergence rate.Compared with the same type optimization algorithm, the algorithm has high scheduling efficiency, therefore, it is suitable for scheduling satellite communication system resources for multi-beam dense networking in the future.…”
    Get full text
    Article
  14. 1134

    Adaptive Predictive Control: A Data-Driven Closed-Loop Subspace Identification Approach by Xiaosuo Luo, Yongduan Song

    Published 2014-01-01
    “…By combining the merits of receding window and recursive identification methods, an adaptive mechanism for online updating subspace matrices is given. …”
    Get full text
    Article
  15. 1135

    Dynamic adaptive trust evaluation model based on interaction-aware by Feng LI, Li-min SHEN, Ya-li SI, Jing-chun NIU

    Published 2012-10-01
    “…A dynamic adaptive trust evaluation model was established based on interaction-aware.The historical interaction window and trustworthy recommendation number was introduced in overall trust evaluation method,which overcomes the shortage of traditional models that lack the capacity to interaction-aware.The direct trust accumulation method based on interaction satisfaction degree iterative calculation was proposed,which achieved the incentive and penalty iterative strategy based on entity stability factor,and effectively inhibits malicious entities with camouflage.A synthetical recommendation trust aggregating method based on combination of direct and indirect recommendation trust was given,which solved the accuracy low and unreliable problems of traditional recommendation methods by introducing entity familiarity factor and scoring similarity factor.Simulation results show that,compared to the existing trust model,the model can effectively improve the accuracy of trust evaluation,and can provide a better capacity of resisting collusive entities.…”
    Get full text
    Article
  16. 1136

    Fiction ou réalité : Les biographies de Constance Fenimore Woolson by Jeannine Hayat

    Published 2007-01-01
    “…Did she commit suicide or fall from a window by accident? Nobody knows. Contemporary novelists like David Lodge, Colm Toibin or Emma Tennant are puzzled by her relationship with Henry James.…”
    Get full text
    Article
  17. 1137

    America is Dead. Long Live America! Political Affect in Days Gone by Soraya Murray

    Published 2021-09-01
    “…While this research addresses matters of representation—particularly notions of fraught masculinity and a struggle for recognition—its focus is on how the game functions as a window onto a fantasy of American self-reliance and populism that strongly resonates with a Trump-era nationalist turn in the U.S. …”
    Get full text
    Article
  18. 1138

    Effective retransmission in network coding for TCP by Jing CHEN, Xue-peng SONG, Fang LIU

    Published 2014-08-01
    “…Theoretical analysis for evaluating the decoding delay and redundancy of the different retransmission schemes show that the feedback based retransmission scheme has a lower decoding delay than the scheme with a fixed retransmis-sion rate, whereas these schemes which retransmit packets containing all packets in the coding window are deeply influ-enced by the loss rate. Therefore a novel network coding retransmission scheme which uses the implicit information of seen scheme to acquire the number of packets the receiver needs for decoding packets is proposed, the encoding rules of retransmission to let a part of packets decodable in advance are changed. …”
    Get full text
    Article
  19. 1139

    Florida Peach and Nectarine Varieties by Mercy Olmstead, Jose Chaparro, Pete Andersen, Jeff Williamson, James Ferguson

    Published 2013-07-01
    “…Furthermore, ripening of these cultivars during April and May ensures an early spring market window for tree-ripe fresh fruit in Florida before peaches and nectarines from other southeastern states and California come to market. …”
    Get full text
    Article
  20. 1140

    Florida Peach and Nectarine Varieties by Mercy Olmstead, Jose Chaparro, Pete Andersen, Jeff Williamson, James Ferguson

    Published 2013-07-01
    “…Furthermore, ripening of these cultivars during April and May ensures an early spring market window for tree-ripe fresh fruit in Florida before peaches and nectarines from other southeastern states and California come to market. …”
    Get full text
    Article