Showing 461 - 480 results of 3,373 for search '"executed"', query time: 0.05s Refine Results
  1. 461

    Study of the Effect of Grafted Antioxidant on the Acrylonitrile-Butadiene Copolymer Properties by Abdulaziz Ibrahim Al-Ghonamy, Mirham A. Barakat

    Published 2010-01-01
    “…The grafting of ADPEA onto natural rubber was executed with UV radiation. Benzoyl peroxide was used to initiate the free-radical grafting copolymerization. …”
    Get full text
    Article
  2. 462

    Prediction of earthquake by machine learning models and neural network by Xu Bohong

    Published 2025-01-01
    “…Earthquake prediction, in this article, is executed with a neural network and machine learning models. …”
    Get full text
    Article
  3. 463

    Investigation of the Optimum Clocking Position in a Two-Stage Axial Turbine by Dieter Bohn, Sabine Ausmeier, Jing Ren

    Published 2005-01-01
    “…A frozen rotor approach in a steady calculation and a sliding mesh approach in an unsteady simulation are performed in a stator clocking investigation. The clocking is executed on the second stator in a two-stage axial turbine over several circumferential positions. …”
    Get full text
    Article
  4. 464

    Preventing fraud in crypto payments by Louise Damkjær Christensen

    Published 2025-03-01
    “…When the transaction is instead executed in bitcoin, an unbacked crypto-asset, the transaction is not covered by any EU regulation despite it being used as a method of payment for goods and other services. …”
    Get full text
    Article
  5. 465

    Transmission Error Analysis for Cycloidal-pin Gear of RV Reducer Considering Tooth Profile Error by Xi Mao, Jing Deng, Tianxing Li, Xiaotao An, Guofeng Wang, Shaowu Nie

    Published 2020-05-01
    “…The digital tooth contact analysis of cycloidal gear is executed based on the gear meshing principle, and the transmission error curve of cycloidal-pin gear considering the tooth profile errors is obtained. …”
    Get full text
    Article
  6. 466

    Belize’s 2016–17 Sovereign Debt Restructuring – Third Time Lucky? by Tamon Asonuma, Michael G. Papaioannou, Eriko Togo, Bert van Selm

    Published 2020-12-01
    “…As was the case in the earlier two restructurings, in 2006–07 and in 2012–13, the 2016–17 debt restructuring was executed through collaborative engagement with creditors outside an IMF-supported program. …”
    Get full text
    Article
  7. 467

    Design of task dividing and offloading algorithm in mobile edge computing by Jing LU, Hanlin LI, Lin GAO

    Published 2021-06-01
    “…Mobile edge computing (MEC) emerges as a new paradigm that pushes the computing infrastructure from the remote cloud data center to the edge equipments.It provides a new solution to meet the delay sensitive and computing intensive requirements of Internet of things (IoT).In this work, the problem of tasks offloading and scheduling in the multi-user and multi-server MEC system was considered.Specifically, each user had a task-dependent application and the tasks could be either executed locally or remotely according to the dependence.Thus, the network performance was improved by unloading and scheduling the sub tasks.Quality of experience (QoE) and fairness between users were used to characterize the network performance, and the optimization problem was modeled as a joint dependent task offloading and scheduling (J-DTOS) problem.The J-DTOS problem was a non-linear mixed integer programming, which was NP-hard in general.The original problem was reformulated by introducing intermediate variables and proposing a near-optimal solution.Simulation results show that the proposed offloading and scheduling design can significantly improve the performance of the system.…”
    Get full text
    Article
  8. 468

    PID Control Perspective: Techniques and Uses by Wisam Subhi Al-Dayyeni, Hussam Saleh Mahmood

    Published 2025-01-01
    “…A study of the evolution of conventional PID and its integration with intelligent control has been executed, taking into account a number of ap-plication fields. …”
    Get full text
    Article
  9. 469

    Principle Analysis and Dynamic Simulation of Self-stabilizing Speed Transmission for Wind Turbine by Su Rui, Li Gangjun, Rui Xiaoming

    Published 2017-01-01
    “…The kinematics analysis for the self-stabilizing speed wind turbine is carried out,and the mass-spring-damper model of the transmission is established for three shafts system with double inputs and single output. The simulation is executed in SIMULINK software with turbulent wind input.The influences on output shaft speed and torque under different inertia,stiffness,damping are discussed. …”
    Get full text
    Article
  10. 470

    Design and Implementation of Plastic Deformation Behavior by Cartesian Impedance Control Based on Maxwell Model by Le Fu, Jie Zhao

    Published 2018-01-01
    “…Implementation in a robot manipulator is executed to validate and analyze the proposed control law. …”
    Get full text
    Article
  11. 471

    Peníze, nebo prestiž? Soudní spor o autorství Vančurových Obrazů z dějin národa českého by Bohumil Jiroušek

    Published 2010-07-01
    “…Vladislav Vančura was writing this book at the end of the 1930’s, while some papers (historical facts) were submitted by young historians Václav Husa, Jaroslav Charvát and Jan Pachta. Vančura was executed during World War II but his collaborators became important representatives of the official Marxist-Leninist historiography after 1948. …”
    Get full text
    Article
  12. 472

    Patient and Family Experience: Targets for Improvements in Care and Communication in the ICU by Caitlin A. LaGrotte PsyD, MEd, Caitlin Baldwin DO, Krystal Hunter PhD, MBA, Emily Damuth MD, Nancy Loperfido BS, Tatheer Moosavi BA, Pearl Parker BA, Nitin Puri MD

    Published 2025-01-01
    “…This process improvement project sought to further explore the experience of patients and family members within an intensive care unit (ICU) hospital setting to develop specific interventions that can be executed to provide better patient-centered outcome. …”
    Get full text
    Article
  13. 473

    A Step-By-Step Guide of Bibliometric Study for Healthcare and Allied Research by Mukesh Kumar, Sommya Kumari, Sowmya Sree Guntipally, Ajay Chhabra, Ashok Kumar, Pankaj Kumar

    Published 2024-12-01
    “…It provides scholars with the ability to obtain a comprehensive overview, pinpoint areas lacking in knowledge, generate novel research philosophies, and apply planned outcomes within the field. Well-executed bibliometric studies can provide scholars with valuable insights, including a broad outline of the research field of interest, identification of research gaps, generation of new research philosophies, and positioning of their contributions. …”
    Get full text
    Article
  14. 474

    RANSAC based robust localization algorithm for visual sensor network by Bo ZHANG, Hai-yong LUO, Ji-wei LIU, Fang ZHAO

    Published 2013-08-01
    “…Due to node failures or environmental changes,observed data on the target will be error in visual sensor network,so the least squares based multi-vision localization algorithm won’t be accurate.A centralized RANSAC based robust localization method was proposed,which can remove the error data and improve the positioning accuracy.Furthermore,to address this issue,energy imbalance of network nodes in centralized RANSAC where all computing load is executed in one single node,a robust localization algorithm based on distributed RANSAC was also proposed,which can distribute a large number of iterative calculations into each node averagely to ensure the network balance on calculation and energy without affecting the robustness.Finally,through comparing experiments on no-RANSAC,cen-RANSAC and dis-RANSAC,it’s verified that this algorithm can obtain robust and good positioning results in a predetermined probability,and the time complexity was analyzed via experiment.…”
    Get full text
    Article
  15. 475

    Research on switch migration method based on minimum cost path by Yingxu LAI, Yewei PU, Jing LIU

    Published 2020-02-01
    “…In order to protect the controller,especially the controller in backbone network,from security threats and attacks,improve the security of the software-defined network (SDN) control plane,a switch migration algorithm based on minimum cost path was proposed.A load prediction module was added to the migration model,which executed a controller load prediction algorithm to obtain a load prediction matrix,and then a migration-target controller set was determined according to the load prediction matrix.The improved Dijkstra algorithm was used to determine the minimum cost path.According to the load state of the controller and the traffic priority of the switch to be migrated,the optimal migration switch set was determined.The problem of isolated nodes was solved that may occur during the migration process.The experimental results show that the migration timing of the algorithm is more reasonable,the selection of the migration controller and the target controller is more reasonable,the load balancing of the control plane is realized,the number of migrations and cost are reduced,and the performance of the controller is improved.…”
    Get full text
    Article
  16. 476

    A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing by Jue-Sam Chou

    Published 2012-01-01
    “…In most cases, they are treated as cryptographic primitives and are usually executed without consideration of possible attacks that might frequently occur in an open network, such as an impersonation, replaying, or man-in-the-middle attack. …”
    Get full text
    Article
  17. 477

    Floating Knee Injury Associated with Patellar Tendon Rupture: A Case Report and Review of Literature by Singaravadivelu Vaidyanathan, Jagannath Panchanathan Ganesan, Mugundhan Moongilpatti Sengodan

    Published 2012-01-01
    “…DCS fixation by bridge plating technique for the distal femur and lateral buttress plating by MIPO technique for proximal tibia were planned and executed under spinal anesthesia with image intensifier. …”
    Get full text
    Article
  18. 478

    Reliability Assessment Methodology for Massive Manufacturing Using Multi-Function Equipment by M. López-Campos, F. Kristjanpoller, P. Viveros, R. Pascual

    Published 2018-01-01
    “…The methodology is applied in a workshop of a textile industry, where there is prior evidence that the failure behavior varies according to the type of function executed by multifunction machines.…”
    Get full text
    Article
  19. 479

    The Fuel System Modification To Strengthen Achievement And The Prospect Of Utilizing Gasoline Ethanol Blended With Water Injection by Wawan Purwanto, Tung-Kwan Liu, Hasan Maksum, Ahmad Arif, Muhammad Yasep Setiawan, Muhammad Nasir

    Published 2024-06-01
    “…The experiment was conducted using fuel with a ration octane number (RON) of 92, gasoline-ethanol was executed up to E25 then applied water injection (Wi). …”
    Get full text
    Article
  20. 480

    Research on RTF array overflow vulnerability detection by De-guang LE, Sheng-rong GONG, Shao-gang WU, Feng XU, Wen-sheng LIU

    Published 2017-05-01
    “…When the virtual function was executed,it could cause array overflow vulnerability due to error operation of the virtual function table of C++ object.By attacking the virtual function,it could cause the system crash,or even the attacker to control the execution of program directly was allowed,which threatened user’s security seriously.In order to find and fix this potential security vulnerability as soon as possible,the technology for detecting such security vulnerability was studied.Based on the analysis of the virtual function call during the MS Word parsing RTF files,the array overflow vulnerability generated by MS Word parsing abnormal RTF files,and a new RTF array overflow vulnerability detection method based on the file structure analytical Fuzzing was proposed.Besides,an RTF array overflow vulnerability detection tool (RAVD,RTF array vulnerability detector) was designed.The test results show RAVD can detect RTF array overflow vulnerabilities correctly.Moreover,the Fuzzing results show RAVD has higher efficiency in comparison with traditional file Fuzzing tools.…”
    Get full text
    Article