Showing 1,161 - 1,180 results of 3,176 for search '"convertible"', query time: 0.06s Refine Results
  1. 1161

    Telehealth Physical Therapy: More Than an Alternative to In Person Care of the Young Athlete by Joseph T. Molony Jr.

    Published 2021-12-01
    “…Opportunities such as the ability to custom tailor the home program with consideration of the patient’s learning abilities, provide movement quality feedback outside of the clinical environment, observe parent/caregiver feedback, involve family members who may not be available to attend in-person visits, and the possibility of converting an in-person cancelation to a telehealth visit in order to maintain continuity of care, are examples of how this model may optimize treatment. …”
    Get full text
    Article
  2. 1162

    Missionary work of Mariae Vitae Congregation by Elena Keidošiūtė

    Published 2009-12-01
    “…According to the rule of Mariae Vitae Congregation, it had to deal with religious and lay education of converted girls (mainly Jewish) and provide them with practical skills of work so they could establish in Catholic society. …”
    Get full text
    Article
  3. 1163

    Knowledge graph based ubiquitous power IoT security visualization technology by Yang YU, Shaomin ZHU, Chaoyi BIAN

    Published 2019-11-01
    “…With the construction of the ubiquitous power IoT,the power network transform to interconnection,the data become more interactive and shared,and the business transform to lateral link-up,which pose new challenges to the original network security protection system.Network security visualization technology helps network security personnel quickly identify potential attacks,locate abnormal events,discover new types of attacks,and quickly capture global network security situation by displaying and analyzing the graph patterns.Based on the knowledge graph,the ubiquitous power IoT security analysis was carried out.The internal and external threat intelligence was modeled firstly.Then the relationship between the conceptual entities was constructed.The threat intelligence as knowledge graph was modeled,and then the abstract and complex alarm information which was invisible was converted into a more intuitive and convenient style,which provided accurate support for ubiquitous network security protection decisions in the power IoT.…”
    Get full text
    Article
  4. 1164

    Possible Link between Metabolic Syndrome and Chronic Kidney Disease in the Development of Cardiovascular Disease by Kosaku Nitta

    Published 2011-01-01
    “…Initial antihypertensive therapy should consist of an angiotensin-converting enzyme inhibitor or angiotensin receptor blocker. …”
    Get full text
    Article
  5. 1165

    A Novel Resource Allocation Algorithm for OFDMA System with Proportional Fairness by Yaohui Wu, Youming Li, Pengfei Shao

    Published 2014-06-01
    “…Existing algorithms couldn't balance system capacity and high fairness well,so a multi-user rate adaptive allocation algorithm was proposed to maximize the capacity of OFDMA system under proportional fairness.Improved maximize the minimum(max-min)user rate model was proposed,the current user was allocated the highest efficiency subcarrier according to the channel efficiency control parameter.If some allocated subcarrier's channel gain was lower than the threshold value,which would be reallocated to another user whose channel gain was highest.Power allocation model was converted into expression of water-filling line; every user's power allocation was resolved according to the resolved water-filling line.Simulation results and analysis show that the proposed scheme can achieve higher capacity and perfect fairness in a variety of SNR cases,while requiring slightly less computation.…”
    Get full text
    Article
  6. 1166

    Особенности поэтики киноромана: проблема перекодирования текста by Natalia Maslenkowa

    Published 2018-06-01
    “…Consequently, the process of making a movie novel is connected with converting information from one form into the other. …”
    Get full text
    Article
  7. 1167

    AdaBoost algorithm based on fitted weak classifier by Pengfeng SONG, Qingwei YE, Zhihua LU, Yu ZHOU

    Published 2019-11-01
    “…AdaBoost algorithm was proposed to minimize the accuracy caused by weak classifiers by minimizing the training error rate,and the single threshold was weaker and difficult to converge.The AdaBoost algorithm based on the fitted weak classifier was proposed.Firstly,the mapping relationship between eigenvalues and marker values was established.The least squares method was introduced to solve the fitting polynomial function,and the continuous fitting values were converted into discrete categorical values,thereby obtaining a weak classifier.From the many classifiers obtained,the classifier with smaller fitting error was selected as the weak classifier to form a new AdaBoost strong classifier.The UCI dataset and the MIT face image database were selected for experimental verification.Compared with the traditional Discrete-AdaBoost algorithm,the training speed of the improved algorithm was increased by an order of magnitude.And the face detection rate can reach 96.59%.…”
    Get full text
    Article
  8. 1168

    Indigenous Agency in the Missionary Encounter: The Example of the Khanty and the Nenets by Eva Toulouze

    Published 2011-09-01
    “…While those who refused to accept the missionaries’ endeavours clearly expressed their independence, those who chose to convert did it sincerely, although their understanding of Christianity did not match the missionaries’ expectations. …”
    Get full text
    Article
  9. 1169

    O Mar e a Independência Nacional - relendo Jaime Cortesão by João Marinho dos Santos

    Published 2007-11-01
    “… O autor, essencialmente, discorda da interpretação de Jaime Cortesão, por haver empolado o peso do comércio à distância, ainda que com base na agricultura, a ponto de o converter no "género da vida nacional" e em factor determinante da Expansão Ultramarina Portuguesa. …”
    Get full text
    Article
  10. 1170

    Raoultella Planticola Bacteremia Following Consumption of Seafood by Philip W Lam, Irving E Salit

    Published 2014-01-01
    “…R planticola possesses the ability to convert histidine to histamine and can produce symptoms of scombroid poisoning when poorly prepared seafood is consumed in large amounts. …”
    Get full text
    Article
  11. 1171

    Recycling of steelmaking dusts: The Radust concept by Jalkanen H., Oghbasilasie H., Raipala K.

    Published 2005-01-01
    “…The Radust technology developed at Koverhar steelwork in Finland for treatment of the most problematic fine fractions of blast furnace and oxygen converter dusts is shortly presented and discussed.…”
    Get full text
    Article
  12. 1172

    CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network by Guojie Liu, Jianbiao Zhang

    Published 2020-01-01
    “…First, the data is preprocessed, the original one-dimensional network intrusion data is converted into two-dimensional data, and then the effective features are learned using optimized convolutional neural networks, and, finally, the final test results are produced in conjunction with the Softmax classifier. …”
    Get full text
    Article
  13. 1173

    A New Approach for Calculation of Metamaterial Printed Fractal Antenna Using Galerkin’s Method by Amjad S. Saedy, Al-Samawal. Saleh, Sadiq. Ali

    Published 2022-01-01
    “…Galerkin’s method is applied to deduce the impedance relationship of the proposed structure and then compute the return loss verses frequency by converting the impedance matrix of the proposed antenna [Z] to the scattering matrix [S]. …”
    Get full text
    Article
  14. 1174

    Transforming Backward by Grant Leyton Simpson, Dot Porter

    Published 2012-02-01
    “…In addition to the digital edition use case, we also investigate a process for converting HTML content to TEI-based language corpora.…”
    Get full text
    Article
  15. 1175

    THE CONUNDRUM FACING CHRISTIAN TRADITIONAL LEADERS by SJ van der Merwe, OG Thebe

    Published 2019-12-01
    “…Volz (2008:112) concedes that, although European missionaries introduced Batswana to Christianity, they had hardly any control over how early Batswana converts perceived and adapted their teachings. In some instances, dikgosi, as traditional leaders, are still facing a serious conundrum of being a Christian, on the one hand, and a custodian of culture, on the other. …”
    Get full text
    Article
  16. 1176

    « A Woman’s Answer » : Adelaide Procter et la poésie face au genre by Fabienne Moine

    Published 2012-06-01
    “…Thus, Procter, as a feminist, writes poems defending feminine values whilst resisting to self-deprecation and to the excessive enhancement of virtues. Converted to Catholicism in 1851, Procter, as a Tractarian, uses her poetry, both religious and feminist, as a weapon against the construction of political and poetical patterns. …”
    Get full text
    Article
  17. 1177

    Restoration of the Greek Catholic Church in Czechoslovakia During the Prague Spring by Ľuboslav Hromják

    Published 2024-12-01
    “…The Greek Catholic Church in Czechoslovakia found itself outlawed after its violent liquidation by the brachial communist power in 1950, and the members of this church were forced to convert to the Orthodox faith. This study explains the difficult process of renewal of the Greek Catholic Church and its structures in the context of the <i>Ostpolitik</i> of the Holy See, represented by the Vatican diplomat and later secretary of state Agostino Casaroli, and in the context of the political relaxation in Czechoslovakia in 1968, during the so-called Prague Spring. …”
    Get full text
    Article
  18. 1178

    Issues at the Rural-Urban Fringe: Methods to Sustain Agricultural Land -- Use-Value Assessment by Rodney L. Clouser

    Published 2005-08-01
    “…Many states use more than one technique in an attempt to prevent land from converting from agricultural to non-agricultural use. …”
    Get full text
    Article
  19. 1179

    Continuous noise covert transmission scheme based on QCSK by Ying HUANG, Zehan WAN, Jing LEI, Ke LAI

    Published 2022-04-01
    “…The existing embedded scheme requires far lower transmission power of the covert system than that of the host system, and thus decreasing the reliability of covert transmission.To figure out the above limitations, a continuous noise covert communication scheme based on quadrature chaos shift keying (QCSK) was proposed.The QCSK signal containing covert information and artificial noise were transmitted alternately, and the illegal energy detection was effectively resisted by the continuity of noise which has strong concealment in both time and frequency domains.Furthermore, extremely low power was not required to meet the demand of convert communication in QCSK, whereas allowing the increase of transmit power under the condition that the performance of the host system to improve the performance of covert transmission.Theoretical analysis and simulation results show that the bit error rate (BER) of covert transmission brings two orders of magnitude improvement compared with the existing scheme at BER=1×10<sup>-7</sup> for host system.…”
    Get full text
    Article
  20. 1180

    Innovation of Teaching Method of Digital Media Art Based on Convolutional Neural Network by Yumei Liu

    Published 2022-01-01
    “…The scheme proposed in this study divides the video frame into image blocks and then uses the BDCT transform to convert the video frame from the spatial domain to the frequency domain. …”
    Get full text
    Article