Suggested Topics within your search.
Suggested Topics within your search.
-
3621
NON-PROBABILISTIC RELIABILITY ANALYSIS METHOD BASED ON INTERVAL ANALYSIS
Published 2015-01-01Get full text
Article -
3622
-
3623
ANALYSIS OF THE EXTENSION OF A BUSINESS IN THE FIELD OF PUBLIC FOOD
Published 2018-01-01“…Assessing the performance and financial position of a company calculated on the basis of the information provided by the companies in the financial statements reveals a certain trend of the company. …”
Get full text
Article -
3624
Cookie based online tracing method for cyberlockers resource
Published 2016-12-01“…Cyberlockers have recently become an Internet-based agent of information dissemination. In light of the non-negligible fraction accounted by the traffic flows originating from cyberlocks, it is necessary to trace them for net-work security. …”
Get full text
Article -
3625
THE PROGRAM COMPLEX «ARTHRON», INTENDED FOR THE QUANTITATIVE ASSESSMENT OF ARTICULAR SYNDROME IN RHEUMATIC DISEASES
Published 2019-06-01“…It is implemented using object-oriented C # language, interactive development environment MS Visual Studio development and NET 4.0. The program complex «Arthron» can operate under the control of OS Windows XP (SP3) or later. …”
Get full text
Article -
3626
Do as the Swedes do? Internet policy and regulation in Sweden – a snapshot
Published 2013-05-01“…When it comes to information technology Sweden is considered to be at the forefront both in terms of technological innovation, as well as in progressive policy-making, regulation and internet freedom. …”
Get full text
Article -
3627
La campagna elettorale per le elezioni comunali di Venezia del 24 marzo 1946
Published 2015-06-01Get full text
Article -
3628
THE DUTCH CARTOGRAPHY’S GOUDEN EEUW, BETWEEN ART AND INDUSTRY.
Published 2019-11-01Get full text
Article -
3629
Cookie based online tracing method for cyberlockers resource
Published 2016-12-01“…Cyberlockers have recently become an Internet-based agent of information dissemination. In light of the non-negligible fraction accounted by the traffic flows originating from cyberlocks, it is necessary to trace them for net-work security. …”
Get full text
Article -
3630
-
3631
-
3632
Human Behavior Recognition Method Based on Edge Intelligence
Published 2022-01-01“…Then the cloud trains the spatial-temporal graph ConvNet model and deploys it to the edge nodes N1∼Nm. …”
Get full text
Article -
3633
Influence of the Neural Network Hyperparameters on its Numerical Conditioning
Published 2020-04-01Get full text
Article -
3634
Research of Fault Diagnosis Method of Rolling Bearing based on CEEMDAN-DRT
Published 2020-04-01Get full text
Article -
3635
Design of a Tri-linked Symmetry IGCT Phase Module with Compact Structure
Published 2015-01-01Get full text
Article -
3636
Fault Feature Extraction of Rolling Bearing based on Blind Separation Noise Reduction by ITD and KICA
Published 2018-01-01Get full text
Article -
3637
-
3638
Analysis of the System Composition and the Obstacle Ability of Hexapod Spider Crawling Robot
Published 2019-03-01Get full text
Article -
3639
INVENTORY OF CRANES AND THEIR MODERN STATE ON THE TERRITORY OF DAGESTAN
Published 2014-11-01“…An analysis of information from literary sources for the last 132 years together with the data of the author's records and interviews show presence of three crane species on the territory of Dagestan: the Siberian crane, the common crane and the demoiselle crane. …”
Get full text
Article -
3640