Showing 441 - 460 results of 3,373 for search '"executed"', query time: 0.06s Refine Results
  1. 441

    Precision Imaging of Frequency Stepped SAR with Frequency Domain Extracted HRRP and Fast Factorized Back Projection Algorithm by Can-bin Yin, Da Ran

    Published 2017-01-01
    “…Imaging validations are executed and all results proved that the FDEM has a great capability of antijamming. …”
    Get full text
    Article
  2. 442

    Les vitraux de l’École de Pharmacie de Paris by Françoise Gatouillat

    Published 2011-12-01
    “…Designed in 1889 by Albert Besnard, the painter who decorated the walls of this room, they were in fact not executed. But two of them were realized later by Henri Carot for private commissioners.…”
    Get full text
    Article
  3. 443

    A New Conjugate Gradient Projection Method for Convex Constrained Nonlinear Equations by Pengjie Liu, Jinbao Jian, Xianzhen Jiang

    Published 2020-01-01
    “…A large number of numerical experiments for the presented method and its comparisons are executed, which indicates that the presented method is very promising. …”
    Get full text
    Article
  4. 444

    Electrical Characterization of Engineering Materials by Mohammad A. Alim

    Published 1996-01-01
    “…The “state of normalization” using physical geometrical factors can only be executed for a specific phenomenon when isolated from the total electrical behavior.…”
    Get full text
    Article
  5. 445

    Port address overloading based packet forwarding verification in SDN by Ping WU, Chaowen CHANG, Yingying MA

    Published 2021-07-01
    “…Aiming at the problem that the existing forwarding verification mechanisms in software-defined networking (SDN) incur significant communication overhead caused by embedding additional packet fields, a packet forwarding verification mechanism based on port address overloading was proposed, which key idea was the ingress switch implemented port address overloading by reconstructing port and address of packet, downstream switches executed packet probabilistic verification based on overloading port address, and the controller acquired valid and invalid packet statistics of node verification in the path and localized anomaly.Anomaly detection threshold of malicious injecting and dropping packets was presented by theoretical analysis.Finally, the proposed scheme was implemented and evaluated.Experiments demonstrate the proposed scheme achieves efficient forwarding and effective anomaly localization with less than 10% of additional forwarding delays and less than 8% of throughput degradation.…”
    Get full text
    Article
  6. 446
  7. 447

    Community, vulnerability and reproduction in disaster conditions. Approaches from Latin America and the CaribbeanIntroduction to dossier by Ana Gabriela Fernández, Johannes Waldmüller, Cristina Vega

    Published 2020-01-01
    “…Finally, themes for debate and reflection are proposed, attempting to contribute to a discussion that is currently in tension in the academia and in the implementation of public policies or actions executed by international cooperation organisms.…”
    Get full text
    Article
  8. 448

    Investigating The Influence of Conformity and Fanaticism on Bullying Dynamics by Agus Mulyana, Anwar Supenawinata, Muhamad Fasha Kurnia

    Published 2023-12-01
    “…A quantitative causality approach was used, with data analysis executed through multiple regression to obtain 349 respondents. …”
    Get full text
    Article
  9. 449

    The Radicalization of Neoliberalism in Brazil and the Role of the Ministry of Tourism in Coalition Presidentialism by Carolina Todesco, Rodrigo Cardoso da Silva

    Published 2024-12-01
    “…The research was based on the theoretical framework of political science regarding coalition presidentialism and carried out documentary research, with the cross-referencing of data regarding composition of coalition parties, parliamentary amendment by political party, political party in charge of the body, and budget executed. The results indicate that the Brazilian Ministry of Tourism remained in the government structure during the ultra-liberal governments, which defended the streamlining of the state machine, as it fulfilled the role of accommodating allied political parties, configuring itself as an instrument to meet parliamentary demands and assist the coalition of governments in Congress. …”
    Get full text
    Article
  10. 450

    Evaluate the Depth of Scouring of the Bridge Base Using Soft Calculation Techniques by Zhangabay Nurlan

    Published 2022-07-01
    “…So the correlation coefficient in the program’s execution is with subsequent data compared to the non-secondary data in the program. …”
    Get full text
    Article
  11. 451

    Blood glucose response to kratom tea (Mitragyna speciosa Korth.) by Fadly Dzul

    Published 2025-01-01
    “…Methods: This evaluation was executed using an experimental design with ten subjects, which included pure standard glucose in week 1 and standard glucose mixed with 1% kratom tea in week 2, with a 1-week wash-out period. …”
    Get full text
    Article
  12. 452

    Detection of sybil attacks based on periodic ultra wide band distance information in WSN by Yanzhi ZHANG, Xiaoqin YE

    Published 2016-08-01
    “…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
    Get full text
    Article
  13. 453

    TECHNIQUES FOR FORMATION OF FERROELECTRIC PHOTONIC AND PHONONIC CRYSTALS by V. V. Krutov, A. S. Sigov, A. A. Shchuka

    Published 2017-04-01
    “…Results of the works executed in Moscow Technological University are briefly described. …”
    Get full text
    Article
  14. 454

    4D Applications of GIS in Construction Management by A. Chaitanya Kumar, T. Reshma

    Published 2017-01-01
    “…Construction industries broadly involve different set of construction activities which are to be executed as per schedule and the major software used for scheduling is PRIMAVERA and Microsoft Project (MSP). …”
    Get full text
    Article
  15. 455

    Adaptive Streaming of Scalable Videos over P2PTV by Youssef Lahbabi, El Hassan Ibn Elhaj, Ahmed Hammouch

    Published 2015-01-01
    “…In this paper, we propose a new Scalable Video Coding (SVC) quality-adaptive peer-to-peer television (P2PTV) system executed at the peers and at the network. The quality adaptation mechanisms are developed as follows: on one hand, the Layer Level Initialization (LLI) is used for adapting the video quality with the static resources at the peers in order to avoid long startup times. …”
    Get full text
    Article
  16. 456

    A Color-Image Encryption Scheme Using a 2D Chaotic System and DNA Coding by Haidar Raad Shakir

    Published 2019-01-01
    “…Thereafter, a DNA exclusive OR (XOR) operation is executed between the DNA sequences of the permuted image and the DNA sequences generated by the TD-ERCS system to produce three encrypted scrambled matrices. …”
    Get full text
    Article
  17. 457

    Performance analysis of REST API technologies using Spring and Express.js examples by Maciej Wicha, Beata Pańczyk

    Published 2023-12-01
    “…The experiment was based on 5 scenarios repeated for a different number of users in the range of 10 to 100, with a constant number of executed requests to the server. The analysis conducted showed that the application implemented in Express.js handles HTTP requests up to 249% more efficiently than its counterpart in Spring. …”
    Get full text
    Article
  18. 458

    An Effective Hybrid Algorithm Based on Particle Swarm Optimization with Migration Method for Solving the Multiskill Resource-Constrained Project Scheduling Problem by Huu Dang Quoc, Loc Nguyen The, Cuong Nguyen Doan

    Published 2022-01-01
    “…The new algorithm proposed in this paper will resolve that by detecting local extremes and escaping that by moving the population to new space. That is executed using the Migration technique combined with the Particle Swarm Optimization (PSO) method. …”
    Get full text
    Article
  19. 459

    Port Contention Aware Task Scheduling for SIMD Applications by Shogo Saito, Kei Fujimoto

    Published 2025-01-01
    “…When SIMD operations are executed in a simultaneous multi-threading (SMT) environment, a performance degradation event, called port contention, is expected to occur due to the limited number of ports caused by the large size of the SIMD circuit. …”
    Get full text
    Article
  20. 460

    Efficient and provably secure attribute-based online/offline encryption schemes by Hai-ying MA, Guo-sun ZENG, GZhan-jun WAN, Wei WANG

    Published 2014-07-01
    “…The ABOOE non-trivially splited the encryption process into two phases: the offline phase first executed most of heavy computations prior to knowing the message and the attributes' set; and then the online phase only performed light computations to produce the ciphertext once the attrib-utes' set and the message get available. …”
    Get full text
    Article