Showing 921 - 940 results of 3,373 for search '"executed"', query time: 0.06s Refine Results
  1. 921

    Diseño de losas de hormigón con geometría optimizada Design of concrete pavement with optimized slab geometry by Juan Pablo Covarrubias V.

    Published 2012-12-01
    “…Slabs of 15 cm thickness suffered from cracking when tested under an average of 12 millions equivalent axles, while slabs of 8 cm thickness endured 75,000 equivalent axles before the first cracking took place. Besides the executed tests demonstrated that fiber concrete slabs may endure until 20 times more traffic before cracking and they are able to provide a longer life span after cracking. …”
    Get full text
    Article
  2. 922

    The JWST-SUSPENSE Ultradeep Spectroscopic Program: Survey Overview and Star Formation Histories of Quiescent Galaxies at 1 < z < 3 by Martje Slob, Mariska Kriek, Aliza G. Beverage, Katherine A. Suess, Guillermo Barro, Rachel Bezanson, Gabriel Brammer, Chloe M. Cheng, Charlie Conroy, Anna de Graaff, Natascha M. Förster Schreiber, Marijn Franx, Brian Lorenz, Pavel E. Mancera Piña, Danilo Marchesini, Adam Muzzin, Andrew B. Newman, Sedona H. Price, Alice E. Shapley, Mauro Stefanon, Pieter van Dokkum, Daniel R. Weisz

    Published 2024-01-01
    “…We present an overview and first results from the Spectroscopic Ultradeep Survey Probing Extragalactic Near-infrared Stellar Emission (SUSPENSE), executed with NIRSpec on JWST. The primary goal of the SUSPENSE program is to characterize the stellar, chemical, and kinematic properties of massive quiescent galaxies at cosmic noon. …”
    Get full text
    Article
  3. 923

    Discourse Structure Analysis of Hasanak-e-Vazir’s Hanging Tale: A Study based on Van Dijk’s (2007) Socio-Cognitive Approach by Nader Abyar, Mousa Ghonchepour, Zahra Iranmanesh

    Published 2024-09-01
    “…Hasank-e-vazir was the last minister of Mahmud Gaznavi and was executed by Masud Gaznavi for being a Qarmatian (Bayhaqi, 1992: 136). …”
    Get full text
    Article
  4. 924

    Estimation and evaluation of iron reserves in the eastern area of Eileh1 mine, Razavi Khorasan province by Hamid Esmati Daroneh, Maryam Gholamzadeh

    Published 2024-12-01
    “…Discussion and conclusion The process of reserve estimation and the preparation of a block model for a mineral deposit involves distinct steps that must be executed deliberately and precisely. This approach ensures an accurate assessment and a suitable model, utilizing default values for reserve calculations within the software. …”
    Get full text
    Article
  5. 925

    COVID-19 – if the cure is worse than the disease. The Italian chaos by Giuseppe FERRARI

    Published 2020-03-01
    “…Earlier on I have highlighted how the result of the chaotic social distancing measures in Italy -meaning in the way they have been formulated and executed - could potentially lead to an irreparable damage to the Italian society and economy. …”
    Article
  6. 926
  7. 927

    The impact of technologies on the development of repetitive speed in handball, basketball and volleyball by Dana Badau, Adela Badau, Virgil Ene-Voiculescu, Carmen Ene-Voiculescu, Dragos Florin Teodor, Constantin Sufaru, Corina Claudia Dinciu, Victor Dulceata, Dan Cristian Manescu, Catalin Octavian Manescu

    Published 2025-01-01
    “…Study tests: the Tapping the plates test-unilateral execution with the dominant hand (TP_dominant hand), the random reactive plate touching test_unilateral execution with the dominant hand (TPR_dominant hand), Touching the plates test- bilateral execution (TP_bilateral), Test Touching the plates bilateral execution-random reactive (TPR_bilateral). …”
    Get full text
    Article
  8. 928

    Estimated Interval-Based Checkpointing (EIC) on Spot Instances in Cloud Computing by Daeyong Jung, JongBeom Lim, Heonchang Yu, Taeweon Suh

    Published 2014-01-01
    “…Our scheme sets the thresholds of price and execution time based on history. Whenever the actual price and the execution time cross over the thresholds, the system saves the state of spot instances. …”
    Get full text
    Article
  9. 929

    Timeout threshold estimation algorithm in mimic multiple executors architecture by Delei NIE, Obo ZHA, Chong WANG, Xin WANG, Binghao YAN

    Published 2018-10-01
    “…Aiming at the problem that the current timeout strategy algorithm is difficult to cope with the violent situation of task volume,a timeout threshold prediction algorithm based on equivalent proportional execution time applied to the mimetic defense architecture system is proposed.The algorithm utilizes the principle that the execution time of multiple functional equivalent executable tasks in the mimetic defense architecture is positively related,predicts the task execution time and sets a reasonable timeout threshold.The simulation results show that the proposed algorithm can dynamically predict and set the timeout threshold for different task situations,which effectively improves the timeout judgment efficiency,especially for scenarios with dramatic changes in workload.…”
    Get full text
    Article
  10. 930

    Children Who Experience Unintentional Injuries: Their Functional Profiles by Sara Rosenblum, Tal Nardi-Moses, Helly Goez, Naor Demeter

    Published 2022-01-01
    “…This study compared the functional behavior and executive function characteristics of school-aged children who experienced unintentional injuries with those of controls who had not been injured. …”
    Get full text
    Article
  11. 931

    Attack signature generation by traceable dynamic taint analysis by Yu LIU, Mei-ning NIE, Pu-rui SU, Deng-guo FENG

    Published 2012-05-01
    “…Most of known attack signature generation systems took either black-box method or white-box method,both of which were limited in several aspects,such as costing a long time to capture sufficient samples,demanding arduous manual analysis and requiring source code of the vulnerable program.An attack signature generation method based on an innovative traceable dynamic taint analysis framework was proposed.By monitoring the vulnerable process execution,the executing trace and the constrain conditions exactly related to input data exploiting the vulnerability was extracted.Finally,by restoring the execution context and supplementing the determinant statements an executable Turing machine signature was attained.A prototype system was implemented and evaluated with different attack samples,which proved that the proposed method was able to generate accurate attack signature fast.…”
    Get full text
    Article
  12. 932
  13. 933

    On the Reorganization of Incentive Structure to Promote Delay Tolerance: A Therapeutic Possibility for AD/HD? by Edmund J. S. Sonuga-Barke

    Published 2004-01-01
    “…First is the suggestion, backed up by data from randomized trials, that training and practice in carefully selected cognitive activities (executive and attentional training) and tasks can provide a way of modifying the processes underlying cognitive, especially executive, deficits in AD/HD. …”
    Get full text
    Article
  14. 934
  15. 935

    THE ROLE OF POLITICAL NETWORKS IN THE SYSTEM OF ADMINISTRATIVE DECISIONS MADE BY AUTHORITIES OF THE REGION IN THE CONDITIONS OF THE CHANGING ENVIRONMENT OF PUBLIC ADMINISTRATION by E. Dolgova, V. Slepova

    Published 2018-07-01
    “…Problems of preparation of execution and control of execution of administrative decisions in the conditions of the changing practice of public administration are considered. …”
    Get full text
    Article
  16. 936

    A Preliminary Investigation of the Running Digit Span As a Test of Working Memory by Marjan Jahanshahi, T. Saleem, Aileen K. Ho, R. Fuller, Georg Dirnberger

    Published 2008-01-01
    “…Both episodic and executive function measures correlated with short and long running spans, suggesting that a simple dissociation between immediate memory and executive processes in short and long running digit span tasks may not be warranted.…”
    Get full text
    Article
  17. 937

    Risk Intelligence: Making Profit from Uncertainty in Data Processing System by Si Zheng, Xiangke Liao, Xiaodong Liu

    Published 2014-01-01
    “…Proactive fault tolerance scheme (such as the speculative execution in MapReduce framework) is introduced to dramatically improve the response time of job executions when the failure becomes a norm rather than an exception. …”
    Get full text
    Article
  18. 938
  19. 939
  20. 940

    Two and a half cheers for the national care standards by Kirstie Maclean

    Published 2002-09-01
    “…Nineteen volumes of National Care Standards were issued by the Scottish Executive in the Spring of 2002. The two volumes which are most relevant and important for residential child care owners, staff, children and young people and their parents, are the Standards relating to 'Care Homes for Children and Young People' (Scottish Executive, 2002a) and 'School Care Accommodation Services' (Scottish Executive, 2002b). …”
    Article