Showing 24,641 - 24,660 results of 33,243 for search 'Theorbo~', query time: 3.14s Refine Results
  1. 24641

    Wireless May Benefit Blockchain by Seungmo Kim, Junsung Choi

    Published 2024-12-01
    “…The paper then proceeds to present extensive simulation results as a means to confirm the underpinning theoretical findings. Overall, we emphasize that the framework’s holisticity will allow it to be applied to diverse consensus mechanisms.…”
    Get full text
    Article
  2. 24642

    Kinematics Simulation Analysis of the Non-coaxial Style Two-output Impulse Generating Mechanism based on ADAMS by Gu Wen, Du Li, Feng Jun, Chen Kui, Wei Dong

    Published 2015-01-01
    “…In order to reduce the pulsation of output angler velocity of the non-coaxial style of two-output impulse generating mechanism,by using rigid body dynamics software ADAMS for parametric modeling,and combining the MATLAB for data analysis,the variation law of the double output rod angular speed and acceleration and the institutional average,pulsation coefficient and abrupt change of angular acceleration with crank length change are obtained.Through the simulation analysis of example,the consistency of output motion and the crank speed adjustability are verified,and the variation law of the mechanism pulsation will be decrease with the increase of crank length.Finally,the impact of long-rod OE and EF change on the double output motion law of mechanism is analyzed,it is shows that,after increasing the length of the rod OE and EF,the mechanism pulsation decreased,a theoretical basis of the dimension synthesis and optimization of the impulse generating mechanism is provided.…”
    Get full text
    Article
  3. 24643

    IMPACT STABILITY ANALYSIS OF JACKING MACHINE WITH AUTOMATIC FOLLOWING SAFETY DEVICE by AN Yu, HUANG XingYuan, LI Bo, LAI HouJian

    Published 2020-01-01
    “…The maximum distance that can exist between the load-bearing roof and the weight during the jacking process is obtained. It provides a theoretical basis for the design of the jacking machine following control.…”
    Get full text
    Article
  4. 24644

    The Economic Pyramid of Unequal Exchange within the European Union by George Economakis, Maria Socrates Markaki

    Published 2024-10-01
    “…On the basis of the theoretical framework of the study, an empirical investigation of unequal exchange within the 27 countries of the European Union (EU27) is developed. …”
    Get full text
    Article
  5. 24645

    Long-range CCΦ gates via radio-frequency-induced Förster resonances by I. N. Ashkarin, S. Lepoutre, P. Pillet, I. I. Beterov, I. I. Ryabtsev, P. Cheinet

    Published 2025-01-01
    “…Taking into account finite Rydberg states lifetimes, we achieve an average theoretical gate fidelity of 99.27% under room-temperature conditions (improved up to 99.65% in a cryogenic environment), thus showing the protocol compatibility with modern quantum error correction techniques.…”
    Get full text
    Article
  6. 24646

    Vers la ville de l’âge IV ? by Charles Ambrosino, Inès Ramirez-Cobo

    Published 2019-06-01
    “…While drawing on the results of an urban project workshop, we will endeavour to develop a theoretical hypothesis in line with the considerations made by Christian de Portzamparc on the three ages of the city. …”
    Get full text
    Article
  7. 24647

    TRANSIENT MOTION SIMULATION AND STRESS ANALYSIS OF RECIPROCATING COMPRESSOR VALVE by WANG Yao, ZHANG JinJie, LIU JinNan, YAO ZiYun, JIANG ZhiNong

    Published 2016-01-01
    “…The results of the analysis have important theoretical significance for valve design optimization and the improvement of valve life.…”
    Get full text
    Article
  8. 24648

    The effect of thickness on out-of-plane constraint in terms of the T-stress by Yu.G. Matvienko

    Published 2014-10-01
    “…The plastic zone is theoretically and numerically analyzed for various combinations of the nonsingular terms xx T to zz T ratios in connection with specimen thickness under mode I loading. …”
    Get full text
    Article
  9. 24649

    Entrepreneurial Intention: Categorization, Classification of Constructs and Proposition of a Model by Fellipe Silva Martins, Eduardo Biagi Almeida Santos, Amélia Silveira

    Published 2019-01-01
    “…There is an over-standardization in studies on EI, and a focus on potential dogmatism in the area – that is, theoretical and methodological inflexibility with replication based on alteration only in substantive domain of EI. …”
    Get full text
    Article
  10. 24650

    A New Type of Space-position Full-balanced Mechanical Crane and Analysis of Its Comprehensive Performance by Song Ningce, Xie Zhijiang, Liu Fei, Li Liangliang

    Published 2018-01-01
    “…The device provides a theoretical basis for the design of smart handling machinery.…”
    Get full text
    Article
  11. 24651

    Why Do People Come to See Mount Everest? Collective Representations and Tourism Practices in the Khumbu Region by Etienne Jacquemet

    Published 2018-01-01
    “…The popularity and increasing openness of the Everest region and its inhabitants to globalisation, which could theoretically call into question the meaning and very principles of this heterotopia, do not seem to affect the experience of trekkers, despite the fact that their practices are based on a complete break with the places and time frames of their everyday life.…”
    Get full text
    Article
  12. 24652

    Le paysage et l’artifice en géographie by Dylan Simon

    Published 2015-07-01
    “…He does not develop a substantial theoretical foundation on this topic nor does he build truly landscape-based analyses in view of a synthetic approach.…”
    Get full text
    Article
  13. 24653

    Academic connotation and research trends of privacy computing by Fenghua LI, Hui LI, Ben NIU, Weidong QIU

    Published 2022-12-01
    “…The authors of this paper first proposed the concept, definition and academic connotation of privacy computing, and formed a relatively mature theoretical and technical system accordingly.In order to continuously promote the academic research and industrial application of privacy computing, the academic connotation of privacy computing was elaborated, including how to understand the full-life cycle, extended control, privacy quantification and mapping, desensitization effect evaluation.Besides, the necessity of iterative on-demand desensitization and the motivation to study the language of privacy computing were presented.The role of audit log self-storage in ubiquitous sharing was explained and some distorted academic concepts were also clarified.Moreover, 37 research points in 9 aspects of privacy computing and 40 research points in 8 aspects of data security were given.It helps to better understand the research scope of privacy computing and correctly distinguish between privacy computing and data security.…”
    Get full text
    Article
  14. 24654

    A Large Goaf Group Treatment by means of Mine Backfill Technology by Hanwen Jia, Baoxu Yan, Erol Yilmaz

    Published 2021-01-01
    “…The volume of each goaf to be backfilled was quantitatively analyzed in the combination of theoretical analysis and three-dimensional laser scanning technology. …”
    Get full text
    Article
  15. 24655

    Study on Design and Experiment for Internal Gear Transmission with High Contact Ratio by Xu Aifen, Jia Jumin, Gao Bo, Tian Guangcai

    Published 2018-01-01
    “…At the same time,a theoretical and technical support for engineering application is provided.…”
    Get full text
    Article
  16. 24656

    Semantic representation and interval roughness analysis of IoT CapBAC rules by Xiaoyan LIANG, Ruizhong DU

    Published 2021-09-01
    “…To break the bottleneck of interval roughness analysis, a rule semantic model IoTACS was proposed, and IoTRA algorithm was given.In IoTACS, a conceptual structure of the IoT CapBAC rule domain was proposed, the quantitative data properties of the basic concepts were given, then the semantic tree model of rule semantics was proposed, the time relations of the time ontology were extended and its quantitative logical representation was given.As the theoretical basis, it was proved that the root cause of interval inconsistency was roughness, and its logical formalization of the roughness was given.The case study shows that IoTRA can help to improve the accuracy of the authorized interval, and the IoTACS model have higher readability than the formal model.The comparison experiments with the IoTC<sup>2</sup> algorithm on the inconsistency analysis show that the response time of the IoTRA algorithm is more significantly reduced.…”
    Get full text
    Article
  17. 24657

    Spectrum access scheme of MAC layer for real-time traffic in cognitive radio network by Rui-fang LI, Quan LIU, Ren-fa LI

    Published 2014-04-01
    “…In channel access contention phase, the effect of channel conflict problem and deaf terminal problem in multichannel coordination can be reduced by designing channel access frame. The theoretical and experimental results were presented to demonstrate the effectiveness of our proposed protocol. …”
    Get full text
    Article
  18. 24658

    RESEARCH ON NUMERICAL SIMULATION METHOD OF THREAD CONNECTION BASED ON FINITE ELEMENT METHOD by JI FangFang, WANG YuBin, LIU Xia

    Published 2019-01-01
    “…The error between the results and the experimental results is within 8%, which is within the range of theoretical calculation. The validity of this method is proved.…”
    Get full text
    Article
  19. 24659
  20. 24660

    Approximate Analytical Solution to Nonlinear Delay Differential Equations by Using Sumudu Iterative Method by Asfaw Tsegaye Moltot, Alemayehu Tamirie Deresse

    Published 2022-01-01
    “…Some basic properties and theorems which help us to solve the governing problem using the suggested approach are revised. …”
    Get full text
    Article