Showing 25,641 - 25,660 results of 33,243 for search 'Theorbo~', query time: 5.00s Refine Results
  1. 25641
  2. 25642

    Culioli, Adamczewski et la linguistique anglaise by Ariel Laurencio Tacoronte

    Published 2021-10-01
    “…We will try here to identify the basis of Culioli’s theoretical formalization which allowed Adamczewski (1978) to construct his metaoperational grammar of English, a grammar consisting of principles later established by this author as universal, starting from the English be + ing structure. …”
    Get full text
    Article
  3. 25643

    Coalescing hardcore-boson condensate states with nonzero momentum by C. H. Zhang, Z. Song

    Published 2025-01-01
    “…To further substantiate the theoretical findings, numerical simulations are conducted. …”
    Get full text
    Article
  4. 25644

    Convergence Rates of Gradient Methods for Convex Optimization in the Space of Measures by Chizat, Lénaïc

    Published 2023-01-01
    “…We also prove the tightness of our analysis with matching lower bounds and confirm the theoretical results with numerical experiments on low dimensional problems. …”
    Get full text
    Article
  5. 25645

    Data protection impact assessment system in the mode of risk management by Ying CHENG

    Published 2018-08-01
    “…In the era of big data,the risk management approach has been broadly applied in the field of personal information protection.Data protection impact assessment has become an important system to promote data protection.It takes the provisions of the data protection impact assessment of the European General Data Protection Regulation (GDPR) 2016 as the sample.By using the literature research and empirical analysis method,it analyzes in depth the theoretical background,rise and evolution,meaning and scope of data protection impact assessment to establish a standardized and specific impact assessment system as well as promote personal information protection.Assessment content includes not only privacy risk assessment,but also data security,data quality and non-discrimination.Data protection impact assessment should be set as a mandatory obligation for data processing activities that are likely to result in high risks.The evaluation process shall take the advices from stakeholders to reflect their benefits.The external supervision should be strengthened and the assessment report shall be published properly.…”
    Get full text
    Article
  6. 25646

    Solving Split Common Fixed-Point Problem of Firmly Quasi-Nonexpansive Mappings without Prior Knowledge of Operators Norms by Jing Zhao, Hang Zhang

    Published 2014-01-01
    “…As a consequence, we obtain strong convergence theorems for split feasibility problem and split common null point problems of maximal monotone operators. …”
    Get full text
    Article
  7. 25647

    Motives for economic migration: A review by Kerstin Mitterbacher

    Published 2025-01-01
    “…Viewed through the interdisciplinary lens and derived from theoretical, empirical, and analytical research outcomes, the present paper concludes that economic migrants’ movements are influenced by the socio-demographic factors of ‘age’ and ‘education’ and are motivated by both the economic motives of ‘expected income’ and ‘employment’ and the economic-related motives of ‘corruption’, ‘amenities’, and ‘happiness’. …”
    Get full text
    Article
  8. 25648

    Extensible hierarchical codec semantic communication system by Yuyuan ZHANG, Haitao ZHAO, Jibo WEI, Kuo CAO, Yichi ZHANG, Peng LUO, Yueling LIU, Kai MEI

    Published 2023-08-01
    “…Aiming at the problem that most current researches on text semantic communication mainly rely on simulation system for theoretical verification, an extensible hierarchical semantic communication system was proposed by taking advantage of the separation of hierarchical encoding and decoding architecture in semantic level and grammatical level.The system was compatible with the reliable communication technology under the framework of Shannon information through the mode of semantic and syntactic separation, and realized the nested combination of semantic communication and traditional communication.Furthermore, a universal and extensible verification system was built based on the software radio platform to verify the proposed semantic communication system architecture.The verification system took semantic communication software platform as the driving core of hardware drive and algorithm call, integrated the whole process of signal generation, information transmission, data acquisition, decoding and evaluation at the receiving end, and could be further extended for semantic and syntactic level.Finally, the text semantic communication was tested based on this verification system, which verified that it had higher validity and reliability than the traditional communication mode.…”
    Get full text
    Article
  9. 25649

    Research of the Plunge Milling for Face Gear by Tang Jinyuan, Yang Xiaoyu

    Published 2015-01-01
    “…Study the face gear machining method by using the plunge milling processing,according to the face gear slotting processing principle and gear engagement principle,a plunging processing method with multi group envelops processing is proposed.Based on the concept of virtual copying of plunge milling cutter to the gear shaper tool,the rotation relation between the gear shaper cutter tooth surface equation,contour surface equation and cutting tool and the face gear moving coordinate system are deduced,and the spur face-gear is processed through multi group envelops.The mathematical formula of the plug mill copying the of the profile of gear shaper cutter and the based on gear shaper cutter and the machine tool structure are given.According to numerical control manufacturing techniques,the NC code based on face gear machined equation is obtained.It is imported into VERICUT to simulate and process.Through the contrasting between simulation and theoretical tooth surface,the feasibility of the proposed method is proved.The proposed method is a new rough machining method for face gear numerical control plunge milling processing,it has great reference value for face gear manufacturing.…”
    Get full text
    Article
  10. 25650

    Spectrum prediction algorithm in ISM band based on two-dimensional LMBP neural network by Xiaoyu WAN, Pan HU, Zhengqiang WANG

    Published 2016-03-01
    “…With the rapid development and application of short-range wireless communications technology,the electromagnetic interference of ISM(2.4 GHz)band has become more apparent.Using the spectral prediction algorithm to predict the information of spectrum occupancy has become an effective way to solve the problem of compatible coexistence between devices.On the basis of verifying the time-domain and frequency-domain correlation of ISM band,an LMBP neural network of time and frequency domain was proposed and applied in the spectral prediction of ISM band.Through simulations and theoretical analysis,the best training combination of time-frequency point (△t=5,△f=2)was obtained.This point improves 95% of the spectrum prediction accuracy under the conditions of the input vector N=9 of the neural network.It increased 9% and 4% prediction accuracy compared with Markov algorithm and time-domain LMBP neural network and it had a better convergence time of training.…”
    Get full text
    Article
  11. 25651

    Multi-version consolidation method for block-level backup data by WANG Shu-peng 1, WU Guang-jun1, WU Zhi-gang3, YUN Xiao-chun1

    Published 2011-01-01
    “…Historical version backup data query efficiency was dependent on the version chain length in a multi-version backup data storage system.A novel block-level backup data multi-version consolidation method was presented for this problem.Any version of a historical full system snapshot could be generated within the incremental backup data version sequence.Theoretical analysis showed that it could increase the target snapshot version query efficiency significantly in the version chain.A variable-length block version merging algorithm was presented to decrease the computing complex-ity in the process of snapshot version merging,according to the block-level backup data distribution features.Finally,the concrete applications and performance analysis for block-level version consolidation method was also introduced.The simulated experiments results expose that the version consolidation method can eliminate redundant version of backup data with the same version chain length,and it can increase full system recovery efficiency than traditional methods sig-nificantly.…”
    Get full text
    Article
  12. 25652

    Malicious domain name detection method based on associated information extraction by Bin ZHANG, Renjie LIAO

    Published 2021-10-01
    “…To improve the accuracy of malicious domain name detection based on the associated information, a detection method combining resolution information and query time was proposed.Firstly, the resolution information was mapped to nodes and edges in a heterogeneous information network, which improved the utilization rate.Secondly, considering the problem of high computational complexity in extracting associated information with matrix multiplication, an efficiency breadth-first network traversal algorithm based on meta-path was proposed.Then, the query time was used to detect the domain names lacking meta-path information, which improved the coverage rate.Finally, domain names were vectorized by representation learning with adaptive weight.The Euclidean distance between domain name feature vectors was used to quantify the correlation between domain names.Based on the vectors learned above, a supervised classifier was constructed to detect malicious domain names.Theoretical analysis and experimental results show that the proposed method preforms well in extraction domain name associated information.The coverage rate and F1 score are 97.7% and 0.951 respectively.…”
    Get full text
    Article
  13. 25653

    Dynamic Compression Behavior and a Damage Constitutive Model of Steel Fibre Reinforced Self-Compacting Concrete by Liang Bian, Jian Ma, Jie Zhang, Ping Li

    Published 2021-01-01
    “…Good consistency between theoretical curves and experimental data was obtained.…”
    Get full text
    Article
  14. 25654

    The Role of Implied Reader in the Realm of Literary Criticism by Hossein Safi Pirlooje

    Published 2018-11-01
    “…Adopting such an anti-objectivist approach, we have taken the text as nothing but a ground for the fusion of authorial horizon with that of the readership, and the implied reader, as a theoretical construct drawn out of rules and regulations most prevalent in story-telling and reading. …”
    Get full text
    Article
  15. 25655

    Criteria for the efficiency of enterprise management in the framework of digital transformation by S. K. Kochina, E. D. Schetinina

    Published 2023-06-01
    “…In this study, the authors used the method of theoretical generalization and comparison, scientific abstraction, logical, induction and deduction methods, etc. …”
    Get full text
    Article
  16. 25656
  17. 25657

    On Semianalytical Study of Fractional-Order Kawahara Partial Differential Equation with the Homotopy Perturbation Method by Muhammad Sinan, Kamal Shah, Zareen A. Khan, Qasem Al-Mdallal, Fathalla Rihan

    Published 2021-01-01
    “…We may apply our method to an additional complicated problem, particularly on the applied side, such as astrophysics, plasma physics, and quantum mechanics, to perform complex theoretical computation. Graphical presentation of few terms approximate solutions are given at different fractional orders.…”
    Get full text
    Article
  18. 25658

    GLOBAL DILEMMA OF NUCLEAR PROLIFERATION: THE CASE OF IRAN by FRANCIS OSAYI OSADEBAMWEN

    Published 2023-12-01
    “…The study adopts national interest as its theoretical framework. It finds that nuclear Iran poses a grave danger in the Middle East region and therefore recommended that there should be restrain in handling Iran and other middle level nuclear states. …”
    Get full text
    Article
  19. 25659

    Approximately optimum power allocation based on ergodic capacity for cooperative communication systems by LIN Fei1, LUO Tao1, LU An-qiong1, YUE Guang-xin1

    Published 2009-01-01
    “…Conventional half-duplex amplify-and-forward(AF) method always adopted cooperative communications model regardless the fading state of the channel,which made insufficient use of the degrees of freedom of the system in a way.So,the problem about "when to cooperate" and the optimum allocation of transmitted power were discussed.An exact ergodic capacity formulation and corresponding upper bound were first derived for a two-user AF cooperative communications system.And then an approximately optimum power allocation scheme(AOPA) was proposed by making use of the upper bound as cost function.Whether the AOPA scheme adopting the cooperative model or not based on the comparison about the channel gains of source-to-destination with that of relay-to-destination.Finally,the system per-formances were analyzed with AOPA scheme when the relay moved in terms of the random direction model.Theoretical analysis and simulation results show that the AOPA outperforms the EPA scheme both in ergodic capacity and symbol-error-rate(SER) performance.…”
    Get full text
    Article
  20. 25660

    Design and Analysis of a Fully Compliant Micro-gripper based on Hinge Stiffness by Deng Zilong, Gao Jinhai

    Published 2016-01-01
    “…The research indicates micro- gripper unilateral output displacement of up to 0. 989 mm when the material strength of the full compliant micro- gripper is limited the allowable range,and the conclusion of finite element simulation is consistent with the theoretical model. Transient behavior is continuous and smooth,and there is no mutation. …”
    Get full text
    Article