Showing 23,621 - 23,640 results of 33,243 for search 'Theorbo~', query time: 4.03s Refine Results
  1. 23621

    Analysis of Meshing Performance for Equal Base Circle Bevel Gear by He Xin, Cao Xuemei

    Published 2019-01-01
    “…By machining and rolling a pair of modified equal base bevel gears,the correctness of TCA modification program is verified. The theoretical and experimental basis for the meshing performance analysis of gear is provided.…”
    Get full text
    Article
  2. 23622

    The Dirichlet Problem for the 2D Laplace Equation in a Domain with Cracks without Compatibility Conditions at Tips of the Cracks by P. A. Krutitskii

    Published 2012-01-01
    “…The well-posed formulation of the problem is given, theorems on existence and uniqueness of a classical solution are proved, and the integral representation for a solution is obtained. …”
    Get full text
    Article
  3. 23623

    Ce que nous appelions « l’histoire des médias » : l’exercice de l’archéologie médiatique by Wolfgang Ernst, Ghislain Thibault

    Published 2015-04-01
    “…Wolfgang Ernst is one of the leading voices of media archeology, a research field that has garnered a growing interest since the 2000s for its fresh theoretical and methodological approaches to the study of media. …”
    Get full text
    Article
  4. 23624

    Near-field microwave imaging and quantitative characterization of defects in PE pipeline by Mingshi LUO, Mengmeng ZHANG, Yang FANG

    Published 2023-09-01
    “…In order to effectively detect internal defects in polyethylene (PE) pipeline, microwave non-destructive testing technology was used to detect and quantify defects in PE pipelines.A clutter suppression imaging enhancement method based on principal component analysis (PCA) was proposed for extracting defect images from PE pipelines.Threshold segmentation techniques were used to extract defect features from the enhanced images.Experimental results demonstrate that the proposed method can effectively image PE pipelines and highlight defects.The imaging quality is superior to that of images without clutter suppression.Compared to theoretical values, the average relative error in defect localization is 2.38 mm, and the relative error in area quantification is 13.25%.…”
    Get full text
    Article
  5. 23625

    THE MECHANICAL ANALYSIS OF PIPELINE LIFTING DURING THE HORIZONTAL DIRECTIONAL CROSSING by DONG ZongZheng, FU BiWei, XI YanQing, LIU Xu

    Published 2016-01-01
    “…And then compared with the calculated value of mathematical model and the value of test measurement,the relative error of theoretical calculation value and experimental value that is about 5. 8% was discovered.Therefore,the mathematical model can be used to guide the actual construction.…”
    Get full text
    Article
  6. 23626

    NEW TRENDS IN CONSUMPTION ON THE COFFEE MARKET

    Published 2019-12-01
    “…The article is written in the form of theoretical considerations supported by an analysis of source materials. …”
    Get full text
    Article
  7. 23627

    Research on fractional repetition codes based on group divisible designs by Bing ZHU, Hui LI, Jun CHEN, Han-xu HOU, Tai ZHOU

    Published 2015-02-01
    “…A novel design of FR (fractional repetition) codes was proposed which aims at providing efficient repair at the minimum bandwidth regenerating point.The design consisted of an outer MDS (maximum distance separable) code and an inner repetition code,called GDDBFR (group divisible design based FR) codes.The proposed codes can achieve the system storage capacity under the random access model and are available for a wide range of parameters.Despite of the table-based repair,theoretical analysis identifies that GDDBFR codes generally have large node repair alternatives.Furthermore,experimental results show that GDDBFR codes can significantly reduce the failure repair time when compared with legacy RS (Reed-Solomon) codes and regenerating codes in the domain.…”
    Get full text
    Article
  8. 23628

    Sorption of Radiocaesium onto Powdered and Compacted Rectorite Studied by Batch and Capillary Methods by Lei Chen, Xianjin Yu

    Published 2007-06-01
    “…The distribution coefficients calculated from theoretical calculations, experimental measurements and the diffusion coefficients of Cs + ions were compared and discussed in detail. …”
    Get full text
    Article
  9. 23629

    A POWERFUL ENCOUNTER: THE RELATION BETWEEN DIACONIA AND SPIRITUALITY by D. Ver Elst

    Published 2020-12-01
    “…Based on the reviewed literature, the different ways in which spirituality and diaconia are related, as well as the influence of spirituality on diaconia and of diaconia on spirituality are discussed. On the basis of theoretical and empirical research literature, the article explores concepts such as calling, effectivity of diaconia through spiritual strategies, humbleness, perseverance and coping that influence diaconia. …”
    Get full text
    Article
  10. 23630

    COMPARATIVE ANALYSIS OF INVESTMENT EXPENDITURES IN BUDGETS: REGIONAL ASPECT by M. N. Solomko

    Published 2020-06-01
    “…The materials of the article can be used as an information base for further theoretical and applied research on the expenditures of regional budgets in general and the problem of budget investment in particular.…”
    Get full text
    Article
  11. 23631

    Extended access control mechanism for cross-domain data exchange by Rongna XIE, Yunchuan GUO, Fenghua LI, Guozhen SHI, Yaqiong WANG, Kui GENG

    Published 2019-07-01
    “…Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constraint control was used to ensure that access to data was authorized before access request,and the propagation control was used for further extension control after obtaining data access right.In addition,by considering data self and data provenance,the direct and indirect access control were realized.Theoretically,the security and effectiveness of the proposed mechanism were proved.Finally,taking the control of electronic invoice as an example,the implementation approach was proposed.The example shows that the proposed mechanism can perform the fine-grained extended control before and after data in the cross-domain and cross-system are exchanged.…”
    Get full text
    Article
  12. 23632

    Architecture, the guardian of nature. The project of the ground within the transformation of urban highways, 1962-2018 by Zeila Tesoriere

    Published 2023-06-01
    “…With this purpose, it reconstructs the hermeneutic reference frame by progressively discussing the theoretical arguments, deepening approaches, and design cases, among which the applicative one elaborated for the transformation of Palermo’s ring road.   …”
    Get full text
    Article
  13. 23633

    Application of Differential Evolution Algorithm in the Construction and Simulation of Interactive English Translation Teaching Mode by Chi Che

    Published 2022-01-01
    “…Additionally, by studying whether the key initial round number can reach the theoretical value under the actual linear layer, the effect of differential evolution algorithm processing teaching information is evaluated. …”
    Get full text
    Article
  14. 23634

    Educational practices in prostitution: experiences in the Associação Sergipana de Prostitutas by Ian Ravih Rollemberg de Aragão, Ilka Miglio de Mesquita, Luzinete Rosa dos Santos

    Published 2023-12-01
    “…Then, we employed documental research with the marks of ASP experiences. As a theoretical referential we used Walsh's (2008) understandings of Decolonial Pedagogy. …”
    Get full text
    Article
  15. 23635

    Kinematics Simulation Analysis of Six-legged Upright Walking Robot based on Adams by Jiulei Zhang

    Published 2020-08-01
    “…The results show that, walking leg mechanism can meet to working requirements of six-legged walking mechanism, design scheme is feasible. The theoretical basis for the next dynamics analysis and optimization design is provided.…”
    Get full text
    Article
  16. 23636

    Performance analysis of multi-relay DF cooperative communication system based on directional antenna by Mingwei WANG, Huisheng ZHANG, Lixin LI, Lifeng HE

    Published 2016-06-01
    “…In order to achieve reliable communication in multi-relay cooperative communication,the directional antenna combining multi-relay cooperative communication system and optimal relay selection decode-and-forward cooperative strategy was presented.Firstly,the theoretical closed form of outage probability of the communication system using directional antenna operating in the three modes of DT-DR,DT-OR and OT-OR were presented.Then for three kinds mode,the collaboration communication system interrupt probability and signal-to-noise ratio,the number of relay nodes,the antenna gain channel fading efficiency and relationship between the channel capacity were analyzed in numerical simulation.These findings reveal that excellent performance of cooperative communication system with directional antennas could be achieved such as smaller outage probability and improved by best relay nodes and optimal power allocation coefficient.…”
    Get full text
    Article
  17. 23637

    A Note on the Properties of Generalised Separable Spatial Autoregressive Process by Mahendran Shitan, Shelton Peiris

    Published 2009-01-01
    “…The spectral density function (SDF), the autocovariance function (ACVF), and the autocorrelation function (ACF) are derived. The theoretical ACF and SDF plots are presented as three-dimensional figures.…”
    Get full text
    Article
  18. 23638

    Label flipping adversarial attack on graph neural network by Yiteng WU, Wei LIU, Hongtao YU

    Published 2021-09-01
    “…To expand the adversarial attack types of graph neural networks and fill the relevant research gaps, label flipping attack methods were proposed to evaluate the robustness of graph neural network aimed at label noise.The effectiveness mechanisms of adversarial attacks were summarized as three basic hypotheses, contradictory data hypothesis, parameter discrepancy hypothesis and identically distributed hypothesis.Based on the three hypotheses, label flipping attack models were established.Using the gradient oriented attack methods, it was theoretically proved that attack gradients based on the parameter discrepancy hypothesis were the same as gradients of identically distributed hypothesis, and the equivalence between two attack methods was established.Advantages and disadvantages of proposed models based on different hypotheses were compared and analyzed by experiments.Extensive experimental results verify the effectiveness of the proposed attack models.…”
    Get full text
    Article
  19. 23639

    Structural Design and Experiment Analysis of a Morphing Wing Structure by Song Zhendong, Li Gang, Guo Bing

    Published 2020-03-01
    “…The optimization algorithm is used to optimize the morphing wing structure. On the basis of theoretical research, the experimental prototype is processed and the related experimental tests are carried out.…”
    Get full text
    Article
  20. 23640

    Between Excess and Subtraction: Scenographic Violence in Howard Barker’s Found in the Ground by Lara Maleen Kipp

    Published 2017-03-01
    “…It contextualises the play through Barker’s theoretical writings, Lingis’ notion of catastrophic time (2000) and Aronson’s proposition of the stage as an abyss (2005).…”
    Get full text
    Article