Showing 381 - 400 results of 3,373 for search '"executed"', query time: 0.06s Refine Results
  1. 381

    IMPROVEMENT OF ALGORITHM FOR FORMATION OF ORTHOGONAL COMPONENTS OF INPUT VALUES IN MICROPROCESSOR RELAY PROTECTION OF POWER LINES IN DISTRIBUTION NETWORKS by F. A. Romaniuk, M. A. Shevaldin

    Published 2014-02-01
    “…The paper considers a new algorithm for formation of orthogonal components of input values in microprocessor relay protection of power lines in distribution networks. Results of the executed investigations have been given in the paper and they reveal high efficiency of the proposed algorithm and a principle possibility of its use in microprocessor relay protection of distribution networks.…”
    Get full text
    Article
  2. 382

    Automatic Analysis of Operational Failures of Electric Power Station Equipment – Efficient Method for Reduction in Expenditure for Power Generation by V. A. Yanitsky

    Published 2008-08-01
    “…The investigations, executed in the 70-ies-80-ies of the last century, have demonstrated that an operator is badly managing his/her duties and makes mistakes while controlling the operation of power-generating equipment. …”
    Get full text
    Article
  3. 383

    Application to Biomedical Data: Using the Topp Leone Inverse Lindley Model by Maha A. Aldahlan

    Published 2022-01-01
    “…The simulation study is executed to investigate the effectiveness of the estimates. …”
    Get full text
    Article
  4. 384

    Turbo equalization and its improvement in BICM-ID based on hard-decision by ZHAO Chun-hui1, LV Qiang1, BI Wen-bin2

    Published 2009-01-01
    “…Conventional receivers executed equalization and channel decoding independently. …”
    Get full text
    Article
  5. 385

    Multipurpose zero watermarking algorithm for medical image based on SVD and SAE by Jieli SUN, Yanxia ZHAO, Zenghui ZHOU, Sheng XING

    Published 2017-11-01
    “…A multipurpose zero watermarking algorithm was proposed according to the copyright protection and tamper location of medical image.The two information matrices were executed the XOR operation with the original robust watermarking image and the original semi-fragile watermarking image separately to generate zero robust watermarking image and zero semi-fragile watermarking image.The experimental results show that effects of extracted zero watermarking image are terrific,and the algorithm can resist the common attacks,particularly its resistance is effect ive for strong attacks.…”
    Get full text
    Article
  6. 386

    The roles portrayed by children in South African magazine advertising by Ernest North

    Published 2022-10-01
    “… This paper summarizes the findings of four studies executed from 1983 to 2003 to determine how marketers in South Africa portray children in magazine advertisements. …”
    Get full text
    Article
  7. 387

    La Frichelette de Thônes. Guerre, mémoire et identité territoriale dans les Aravis de 1793 à l’âge d’internet by Franck Roubeau

    Published 2016-05-01
    “…It soon became the ‘Savoy Vendée’, staying that way for many years, its memory perpetuated alongside that of its heroine, La Frichelette, executed by firing squad. Her fate, since her death, reveals a commemorative dynamic, with popular and scholarly roots, which has sustained deep-rooted mistrust of novelty and outside changes.fr…”
    Get full text
    Article
  8. 388

    Colonial interference in the translations of the Bible in Southern Sotho by T. J. Makutoane, J. A. Naudé

    Published 2009-12-01
    “… Bible translation in South Africa was initially conceptualised and executed by either missionary societies or Bible societies. …”
    Get full text
    Article
  9. 389

    La Frichelette of Thônes. War, Memory and Territorial Identity in Aravis from 1793 to the Age of Internet by Franck Roubeau

    Published 2016-05-01
    “…It soon became the ‘Savoy Vendée’, staying that way for many years, its memory perpetuated alongside that of its heroine, La Frichelette, executed by firing squad. Her fate, since her death, reveals a commemorative dynamic, with popular and scholarly roots, which has sustained deep-rooted mistrust of novelty and outside changes.…”
    Get full text
    Article
  10. 390

    Design and development of advanced spatio temporal database models by Garima Jolly, Sunita Bhatti

    Published 2024-09-01
    “…The spatial queries executed using the proposed approach can reduce the computational time needed to find an optimal collision free path for network analysis. …”
    Get full text
    Article
  11. 391

    A machine learning based variable selection algorithm for binary classification of perinatal mortality. by Maryam Sadiq, Ramla Shah

    Published 2025-01-01
    “…The CARS-Logistic model is executed to determine the significant factors of perinatal mortality in Pakistan. …”
    Get full text
    Article
  12. 392

    Correlation Analysis Approach About Numerous Security Information and Event in Telecommunication Network by Ning Fan, Guoshui Shi, Jun Shen, Huamin Jin

    Published 2013-10-01
    “…Correlation analysis engine which correlate isolated security event as a chain to find out the real threat from a large number of false alarms or low level ones,is a key module of security operations centre(SOC).The traditional correlation analysis mechanism is divided into two types:state machine and inference-engine.For poor precision and low efficiency,they don't adapt telecom network application.A new correlation analysis mechanism based on consecutive state by inference-engine was presented,which executed efficiently and accurately,to solve the problems of correlation analysis engine applied in telecom network.…”
    Get full text
    Article
  13. 393

    Research on technology of data encryption and search based on access broker by Guofeng WANG, Chuanyi LIU, Peiyi HAN, Hezhong PAN, Binxing FANG

    Published 2018-07-01
    “…Broker executed searchable encryption (BESE) scheme was proposed for the confidentiality issues of cloud application data.The scheme did not need to modify the cloud application or user habits,thus had strong applicability.Firstly,systematic and quantitative analysis on BESE scheme was conducted in terms of query expressiveness,performance and security.Then,the main challenges of BESE scheme including securely sharing index and encrypted data between brokers were pointed out,and corresponding schemes were proposed to address the above challenges.The experimental results show that the BESE scheme can effectively protect the user data in the cloud,achieve a variety of search functions,and has high efficiency and security.…”
    Get full text
    Article
  14. 394

    Prediction of fatigue crack initiation under biaxial loading by J.V. Sahadi, D. Nowell, R.J.H. Paynter

    Published 2017-06-01
    “…In this context, an extension of this study was executed considering the strain based critical plane approaches proposed by Fatemi-Socie (FS) and Smith- Watson-Topper (SWT). …”
    Get full text
    Article
  15. 395

    Flat stone ceilings in the medieval Armenian architecture by Армен Казарян

    Published 2024-12-01
    “…Nevertheless, such ceilings had an exceptional development in Armenian architecture from the 11th to the 13th centuries. They were executed in different masonry techniques and with a decor resembling starry heavens. …”
    Get full text
    Article
  16. 396

    Improved tree structure anti-collision algorithm of RFID by Xue WANG, Zhi-hong QIAN, Xiao-hui LIU, Chao CHENG

    Published 2015-07-01
    “…The whole big query tree is divided into several branches,and the work of tag recognition is executed in each branch,thus reducing the probability of tag collision.The proposed algorithm can be divided into prefix determination and branch query two phases.In the prefix determination phase,the prefix of every tag is identified,and each prefix denotes a branch.Traverse each branch by turns to recognize tags; in the branch query phase,backward search strategy and dynamic search method are used.Theoretical analysis and simulation experiment show that when the improved algorithm can improved the overall performance of RFID system from the aspects of the number of queries,time delay,and throughput.…”
    Get full text
    Article
  17. 397

    Investigation of Apparatus Reliability Applied for Protection of Power Networks in Emergency Operational Cases at Dwelling Sector of the Republic of Belarus by G. T. Kulakov, A. N. Kukharenko

    Published 2007-10-01
    “…The paper contains results of experimental comparative investigations concerning operation of fuses for 25 A current and automatic thread fuses for nominal 25 A current.The investigations have shown that fuses do not ensure protection of power networks in a dwelling in 40 % of executed tests. Replacement of these fuses for automatic thread ones permits to reduce a number of fires in a dwelling sector and, first of all, in the rural area.…”
    Get full text
    Article
  18. 398

    CORPORATE SOCIAL RESPONSIBILITY AS AN INTEGRAL PART OF EFFECTIVE ACTIVITY OF ORGANIZATION by Zi Gunchao

    Published 2020-02-01
    “…When properly understood and executed, it is a win-win strategy, that benefits both the company and society.…”
    Get full text
    Article
  19. 399

    Guillotiner les simples d’esprit et les « demi-fous » ? Atténuation de la responsabilité pénale et application de la peine de mort (France, IVe République) by Nicolas Picard

    Published 2014-09-01
    “…It was then assumed that the mentally unbalanced and retarded criminals shouldn't be executed. However, a study of the pardon requests indicates that a « diminished responsibility » could not always prevent an execution. …”
    Get full text
    Article
  20. 400

    PROBABILISTIC ANALYSIS FOR SCHMIDT FACTOR OF POLYCRYSTALS by ZHOU JinYu, ZHU FuXian, CHEN Zhen

    Published 2016-01-01
    “…On the meso-scale,for textured and untextured polycrystalline,relationships between Schmidt factor and stochastic Euler angles of grains orientation are discussed respectively,the fact that face-centered and body-centered crystals with the same orientation presenting the same Schmidt factor is proved,the meso-scale probabilistic model of Schmidt factor is built,and the statistical simulation based on meso-scale is executed. The probabilistic distribution of the Schmidt factor of grains group in fatigue crack initiation zone is obtained,which can provide theoretical basis and effective engineering method for fatigue reliability analysis of the mechanical structure,especially micromechanical and micro electromechanical structures.…”
    Get full text
    Article