Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Deuce (Computer).

Artykuły w czasopismach na temat „Deuce (Computer)”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Deuce (Computer)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Young, Vinson, Prashant J. Nair i Moinuddin K. Qureshi. "DEUCE". ACM SIGPLAN Notices 50, nr 4 (12.05.2015): 33–44. http://dx.doi.org/10.1145/2775054.2694387.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Wetherfield, M. "Personal Recollections of Programming DEUCE in the Late 1950s". Computer Journal 53, nr 9 (6.11.2009): 1535–49. http://dx.doi.org/10.1093/comjnl/bxp093.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Yuh-Shyan Chen, Ming-Chin Chuang i Chung-Kai Chen. "DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks". IEEE Transactions on Vehicular Technology 57, nr 2 (marzec 2008): 1126–41. http://dx.doi.org/10.1109/tvt.2007.907027.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Bruss, F. Thomas. "Combined Games with Randomly Delayed Beginnings". Mathematics 9, nr 5 (4.03.2021): 534. http://dx.doi.org/10.3390/math9050534.

Pełny tekst źródła
Streszczenie:
This paper presents two-person games involving optimal stopping. As far as we are aware, the type of problems we study are new. We confine our interest to such games in discrete time. Two players are to chose, with randomised choice-priority, between two games G1 and G2. Each game consists of two parts with well-defined targets. Each part consists of a sequence of random variables which determines when the decisive part of the game will begin. In each game, the horizon is bounded, and if the two parts are not finished within the horizon, the game is lost by definition. Otherwise the decisive part begins, on which each player is entitled to apply their or her strategy to reach the second target. If only one player achieves the two targets, this player is the winner. If both win or both lose, the outcome is seen as “deuce”. We motivate the interest of such problems in the context of real-world problems. A few representative problems are solved in detail. The main objective of this article is to serve as a preliminary manual to guide through possible approaches and to discuss under which circumstances we can obtain solutions, or approximate solutions.
Style APA, Harvard, Vancouver, ISO itp.
5

Zhang, Gang, Hongyu Wang, Jahanzaib Israr, Wenguo Ma, Youzhen Yang i Keliang Ren. "A Fractal Entropy-Based Effective Particle Model Used to Deduce Hydraulic Conductivity of Granular Soils". Fractal and Fractional 6, nr 9 (28.08.2022): 474. http://dx.doi.org/10.3390/fractalfract6090474.

Pełny tekst źródła
Streszczenie:
In this study, a rigorous mathematical approach used to compute an effective diameter based on particle size distribution (PSD) has been presented that can predict the hydraulic conductivity of granular soils with enhanced rigor. The PSD was discretized based on an abstract interval system of fractal entropy, while the effective diameter of soil was computed using the grading entropy theory. The comparisons between current entropy-based effective diameter (DE) and those computed using existing procedures show that the current DE can capture the particle size information of a given soil more accurately than others. Subsequently, the proposed DE was successfully implicated into Kozeny–Carman’s formula to deduce the saturated hydraulic conductivity of soils with enhanced accuracy. The proposed model was tested using current and previously published experimental data from literature. Not surprisingly, the results of the current model and those from previous experimental studies were found to be consistent, which can sufficiently verify the proposed entropy-based effective diameter model.
Style APA, Harvard, Vancouver, ISO itp.
6

Tchomté, Naomi Dassi, Franklin Tchakounté, Clovis Kenmogne Tchuinte i Kalum Priyanath Udagepola. "RetrieveDroid: k-NN Performance Evaluation of Distance Measurement Schemes for Android Malware Detection Using Case-Based Retrieval". European Journal of Information Technologies and Computer Science 4, nr 2 (7.07.2024): 16–21. http://dx.doi.org/10.24018/compute.2024.4.2.126.

Pełny tekst źródła
Streszczenie:
One of the big challenges in cybersecurity is the detection of Android attacks since Android is the most popular mobile operating system. Within this system, applications require certain permissions to access critical resources. Investigation of the use of permissions is a concern to check whether an application is not mislead to divulge sensitive information. This work aims to determine whose distance schemes offers the best malware detection based on permission similarities. Case based reasoning (CBR) is a concept which aims to find a solution based on historical experiences. CBR performance relies on finding similarities between actual cases and stored cases and then to deduce solutions. This paper proposes to transform app data as vector of appearance of dangerous permissions and to store such vectors based on CBR structure. Then we investigate k-NN classification performance related to five distance-based metrics such as Euclidean, Cosine, Manhattan, Minkowski, and Mahalanobis. Experiments were carried out with a set of 419 applications, including 203 malicious and 216 benign samples. The whole dataset has been split in training set of 291 samples with 162 benign and 129 malicious, and the testing set of 128 samples with 54 benign and 74 malicious samples. k-Nearest Neighbor (k-NN) are used as the similarity algorithm in which the distance model is varied in each of the five distance models. Results reveal that Minkowski and Manhattan models provide the best overall performance to detect Android malware based on permissions, in terms of accuracy (99.21%) and precision (97%). This work is a good start to recommend to researchers distance metrics exploitable when performing permission similarity-based detection.
Style APA, Harvard, Vancouver, ISO itp.
7

Tian, Chao. "Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching". Entropy 20, nr 8 (13.08.2018): 603. http://dx.doi.org/10.3390/e20080603.

Pełny tekst źródła
Streszczenie:
We illustrate how computer-aided methods can be used to investigate the fundamental limits of the caching systems, which are significantly different from the conventional analytical approach usually seen in the information theory literature. The linear programming (LP) outer bound of the entropy space serves as the starting point of this approach; however, our effort goes significantly beyond using it to prove information inequalities. We first identify and formalize the symmetry structure in the problem, which enables us to show the existence of optimal symmetric solutions. A symmetry-reduced linear program is then used to identify the boundary of the memory-transmission-rate tradeoff for several small cases, for which we obtain a set of tight outer bounds. General hypotheses on the optimal tradeoff region are formed from these computed data, which are then analytically proven. This leads to a complete characterization of the optimal tradeoff for systems with only two users, and certain partial characterization for systems with only two files. Next, we show that by carefully analyzing the joint entropy structure of the outer bounds for certain cases, a novel code construction can be reverse-engineered, which eventually leads to a general class of codes. Finally, we show that outer bounds can be computed through strategically relaxing the LP in different ways, which can be used to explore the problem computationally. This allows us firstly to deduce generic characteristic of the converse proof, and secondly to compute outer bounds for larger problem cases, despite the seemingly impossible computation scale.
Style APA, Harvard, Vancouver, ISO itp.
8

S., Sujitha. "Linguistic mastery: Advances in natural language processing". Applied and Computational Engineering 20, nr 11 (20.12.2023): 13–18. http://dx.doi.org/10.54254/2755-2721/20/ojs/20231063.

Pełny tekst źródła
Streszczenie:
NLPstands for Natural Language Processing, it is a kind of artificial intelligence. That demonstrate with scrutinize, understanding, and accuse natural human languages. In such a manner that analog procedure would get in touch and human language excluding computer-propel language like programming language such as c, c++, python, javascript. NLP field contains the intellect computer programming into an understanding language which is understandable by humans. So, powerful algorithms can even interpret one language into another language scrupulously. Natural language processing occasionally also known as “computational linguistics”, it uses semantics and syntax. It assists computers to acknowledge how humans talk or write and also it will know how to deduce meaning of words that they are saying. A language is designate as a synchronize of rules and symbols. These Symbol are amalgamated and used for disseminate the data as well as make contact to other resources. Symbols are potentiate by the rules and regulations.
Style APA, Harvard, Vancouver, ISO itp.
9

S., Sujitha, Shree Ganesh L., G. Soniya Priyatharsini i S. Geetha. "Linguistic mastery: Advances in natural language processing". Applied and Computational Engineering 20, nr 1 (23.10.2023): 13–18. http://dx.doi.org/10.54254/2755-2721/20/20231063.

Pełny tekst źródła
Streszczenie:
NLPstands for Natural Language Processing, it is a kind of artificial intelligence. That demonstrate with scrutinize, understanding, and accuse natural human languages. In such a manner that analog procedure would get in touch and human language excluding computer-propel language like programming language such as c, c++, python, javascript. NLP field contains the intellect computer programming into an understanding language which is understandable by humans. So, powerful algorithms can even interpret one language into another language scrupulously. Natural language processing occasionally also known as computational linguistics, it uses semantics and syntax. It assists computers to acknowledge how humans talk or write and also it will know how to deduce meaning of words that they are saying. A language is designate as a synchronize of rules and symbols. These Symbol are amalgamated and used for disseminate the data as well as make contact to other resources. Symbols are potentiate by the rules and regulations.
Style APA, Harvard, Vancouver, ISO itp.
10

Heda, N. L., Alpa Dashora, Jagrati Sahariya i B. L. Ahuja. "Role of Oxygen Atoms in Bonding Properties of Semiconducting Tungsten Trioxide". Solid State Phenomena 209 (listopad 2013): 156–59. http://dx.doi.org/10.4028/www.scientific.net/ssp.209.156.

Pełny tekst źródła
Streszczenie:
We have computed the Mulliken’s population (MP) to deduce charge transfer from WO in semiconducting WO3 using density functional theory (DFT) within pseudopotential scheme. In the DFT scheme, second order generalized gradient approximation for exchange and correlation has been implemented for the first time. The MP data show significant difference in charge transfer between W and six non–equivalent O atoms. In addition, the full potential linearized augmented plane wave method has been applied to compute the partial and total density of states. The MP data have also been explained in terms of partial DOS.
Style APA, Harvard, Vancouver, ISO itp.
11

Hou, Yongjun, i Pan Fang. "Synchronization and Stability of Two Unbalanced Rotors with Fast Antirotation considering Energy Balance". Mathematical Problems in Engineering 2015 (2015): 1–15. http://dx.doi.org/10.1155/2015/694145.

Pełny tekst źródła
Streszczenie:
We consider synchronization and stability of two unbalanced rotors reversely and fast excited by induction motors fixed on an oscillating body. We explore the energy balance of the system and show how the energy is transferred between the rotors via the oscillating body allowing the implementation of the synchronization of the two rotors. An approximate analytical analysis, energy balance method, allows deriving the synchronization condition, and the stability criterion of the synchronization is deduce by disturbance differential equations. Later, to prove the correctness of the theoretical analysis, many features of the vibrating system are computed and discussed by computer simulations. The proposed method may be useful for analyzing and understanding the mechanism of synchronization, stability, and energy balance of similar fast rotation rotors excited by induction motors in vibrating systems.
Style APA, Harvard, Vancouver, ISO itp.
12

Sarker, Mohammed Abu Kawsar, Md Abdullah Al Amin, Md Johirul Lslam, AKM Nuruzzaman i Avisak Bhattacharjee. "Dence of Postoperatve Deep Vein Thrombosis:A Study of 150 Cases". Journal of Surgical Sciences 20, nr 2 (7.11.2019): 42–45. http://dx.doi.org/10.3329/jss.v20i2.43813.

Pełny tekst źródła
Streszczenie:
Background: Venous thromboembolism remains a common cause of morbidity and sometimescause of death in surgical practice. In developed world about 10% of hospital deathsare due to pulmonary embolism resulting from deep vein thrombosis( DVT). DVT in Asiancountries is not a rare condition. Objective: The purpose of the study was to find the incidence ,demgraophic characterand risk factors of deep vein thrombosis. Methods: 150patients undergoing emergency or elective operation of more than one hourof duration was selected for study. Patients evaluated by history, clinical examination andduplex scan. Collected analyzed by computer program. Results: 102 cases were male and 48 cases were female. The incidence of DVT in malewas 36.3% while among females it was 27.5%. venous thrombosis in age group above 50yrs is quite high, (43.33%) . One-fifth of the DVT patients were smokers. Longer duration ofoperation procedure was correlated with development of DVT and development of DVT waslittle higher in emergency operation than elective one. The occurrence of the condition insome co-morbid states especially diabetes mellitus (36. 7%) and cancer (33.3%) is noteworthy.Out of 51 DVT patients more than 84% developed sub-clinical DVT. Conclusion: In Bangladesh it is assumed that DVT is rare. But the current study revealsthat the incidence of postoperative DVT in Bangladesh is not that much rare event. Journal of Surgical Sciences (2016) Vol. 20 (2) :42-45
Style APA, Harvard, Vancouver, ISO itp.
13

Munaro, Hector Luiz Rodrigues, Diego Augusto Santos Silva i Adair Da Silva Lopes. "Prevalence of excessive screen time and associated factors in a school from a city in the northeast of brazil". Journal of Human Growth and Development 26, nr 3 (28.11.2016): 360. http://dx.doi.org/10.7322/jhgd.122821.

Pełny tekst źródła
Streszczenie:
Introduction: Studies about screen time and its correlates are generally determined by the sum of the duration of several behaviours. Studies that analysed behaviours separately highlighted different correlates. Objective: Estimate the prevalence of excessive screen time, through watching television and using computers or video games, and its correlates, in students in a city in North-eastern Brazil. Methods: An investigation in a high school located in the city of Jequie, Bahia state, Brazil, with a sample of 1163 students between 14 and 20 years. The dependent variables were excessive time watching television and using computers or video games, and the independent ones were socio-demographic and lifestyle variables. The magnitude of the association was determined by the Odds Ratio (OR) and by 95% of con fi dence intervals (CI). Results: The prevalence of excessive time watching television was estimated at 32.8% (95% CI: 29.9% - 35.5%) and using computer/videogames was 27.3% (95%CI: 24.5% - 29.5%). Those who did not work (OR = 1.940; 95%CI: 1.365 - 2.758); those students whose mothers had less than eight years of schooling (OR = 1.324; 95%CI: 1.023 - 1.714); and who did not regularly eat vegetables (OR = 1.423; 95%CI: 1.082-1.871) were more likely to be exposed to excessive television. On the other hand, those who had not reached the minimum consumption of fruits (OR = 0.712; 95% CI: 0.245 - 0.929) showed lower odds. Female students (OR = 0.694; 95%CI: 0.528 - 0.912) and students with family income lower than two minimum wages (OR = 0.630; 95%CI: 0.474 - 0.838) had lower chances of exposure to excessive time using computer/video games, while the insufficiently active (OR = 0.631; 95% CI: 0.438 - 0.911) showed higher chances. Conclusions: About 1/3 of the students spent too much time in front of the television and computer/video games, with a different correlation relative to each of these behaviours.
Style APA, Harvard, Vancouver, ISO itp.
14

Nagel, Stuart S. "Simulating past decision-making to deduce motives and perceptions". SIMULATION 52, nr 6 (czerwiec 1989): 222–23. http://dx.doi.org/10.1177/003754978905200604.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Achilles, Rüdiger, Mirella Manaresi i Peter Schenzel. "A Degree Formula for Secant Varieties of Curves". Proceedings of the Edinburgh Mathematical Society 57, nr 2 (21.08.2013): 305–22. http://dx.doi.org/10.1017/s0013091513000497.

Pełny tekst źródła
Streszczenie:
AbstractUsing the Stückrad–Vogel self-intersection cycle of an irreducible and reduced curve in pro-jective space, we obtain a formula that relates the degree of the secant variety, the degree and the genus of the curve and the self-intersection numbers, the multiplicities and the number of branches of the curve at its singular points. From this formula we deduce an expression for the difference between the genera of the curve. This result shows that the self-intersection multiplicity of a curve in projectiveN-space at a singular point is a natural generalization of the intersection multiplicity of a plane curve with its generic polar curve. In this approach, the degree of the secant variety (up to a factor 2), the self-intersection numbers and the multiplicities of the singular points are leading coefficients of a bivariate Hilbert polynomial, which can be computed by computer algebra systems.
Style APA, Harvard, Vancouver, ISO itp.
16

Bruggmann, G., E. Schanda i A. Magun. "Computer Simulation of a Solar Microwave Burst". International Astronomical Union Colloquium 104, nr 2 (1989): 337–40. http://dx.doi.org/10.1017/s025292110015448x.

Pełny tekst źródła
Streszczenie:
A simple impulsive event observed at microwave frequencies between 3.2 and 50 GHz is simulated with a homogeneous source model. Intensity and polarization of the 1984 April 26 event are shown in fig. 1a and 1b, respectively. The spectral maximum is close to the observing frequency of 11.8 GHz.The time profiles of the intensity I and the circular polarization ρc at this frequency as well as the spectrum at different characteristic phases (rise, maximum and decay) are calculated and compared with the observation in order to deduce parameters of the microwave source.
Style APA, Harvard, Vancouver, ISO itp.
17

Vieira, D. A. N., S. M. Dabney i D. C. Yoder. "Distributed soil loss estimation system including ephemeral gully development and tillage erosion". Proceedings of the International Association of Hydrological Sciences 367 (3.03.2015): 80–86. http://dx.doi.org/10.5194/piahs-367-80-2015.

Pełny tekst źródła
Streszczenie:
Abstract. A new modelling system is being developed to provide spatially-distributed runoff and soil erosion predictions for conservation planning that integrates the 2D grid-based variant of the Revised Universal Soil Loss Equation, version 2 model (RUSLER), the Ephemeral Gully Erosion Estimator (EphGEE), and the Tillage Erosion and Landscape Evolution Model (TELEM). Digital representations of the area of interest (field, farm or entire watershed) are created using high-resolution topography and data retrieved from established databases of soil properties, climate, and agricultural operations. The system utilizes a library of processing tools (LibRaster) to deduce surface drainage from topography, determine the location of potential ephemeral gullies, and subdivide the study area into catchments for calculations of runoff and sheet-and-rill erosion using RUSLER. EphGEE computes gully evolution based on local soil erodibility and flow and sediment transport conditions. Annual tillage-induced morphological changes are computed separately by TELEM.
Style APA, Harvard, Vancouver, ISO itp.
18

Wu, Chiu Chin, Yii Wen Hwang i Shu Hong Lin. "Dynamic Analysis and Simulation of Virtual Engine". Applied Mechanics and Materials 121-126 (październik 2011): 3770–78. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3770.

Pełny tekst źródła
Streszczenie:
The purpose of this study was to establish a complete dynamic analysis method for motorcycle engines to serve as course material for study of machine dynamics. Virtual engine software was also developed for users to understand how engine performance is influenced by parameters such as engine accelerator, engine weight, and flywheel. First we applied the vector-loop approach to deduce the kinematic analysis of engine mechanism. We then applied Newton’s method to analyze the bearing force and friction of each link. Next, we used a power equation to deduce the equation of motion of the system, and used the Runge-Kutta method to perform normal dynamic analysis. Finally, by combining computer programs with the Open Graphics Library (OpenGL), we developed virtual engine software for users to observe motion and performance of engine. The results of this study provide engineers a computer-aided design program for automatic generation of all optimal pipes. It is beneficial to pipe design ability.
Style APA, Harvard, Vancouver, ISO itp.
19

Anisimov, Volodymir O., Oleh V. Maslov i Vadim A. Mokritskiy. "ANALYSIS OF GAMMA-RAY SPECTRUM OBTAINED WITH CDZNTE-DETECTORS USING THE ROOT CERN SOFTWARE FRAMEWORK". Herald of Advanced Information Technology 4, nr 1 (26.03.2021): 35–46. http://dx.doi.org/10.15276/hait.01.2021.3.

Pełny tekst źródła
Streszczenie:
Semiconductor CdZnTe gamma spectrometers allow the implementation of new radiation monitoring technologies. However, the energy resolution from 5 to 10 keV and the small size of the detector may result in the detector being unable to resolve photopeaks with very close energies. Algorithms deduce the source identity from the spectrum and must rely on a well-established peak separation in cases where multiple sources are involved. Some techniques exist, but they are computationally expensive, both in memory and processor speed. Typically they can lead to critical performance problems when run on single board computers. To solve this problem, spectral deconvolution methods such as Gold or Richardson-Lucy algorithmshave been proposed, that somewhat resolve the complex spectrum. The realized functions of spectra processing implemented in the ROOT CERN allow solving the indicated contradictions. The article presents the results of using ROOT CERN on a single-board computer for analyzing the spectra measured with a CdZnTe spectrometer. The results show that the spectral deconvolution methods used have high accuracy and efficiency in the deconvolution of complex spectra.
Style APA, Harvard, Vancouver, ISO itp.
20

Robertson, Edmund F., i Kevin Rutherford. "A computer proof of relations in a certain class of groups". Proceedings of the Royal Society of Edinburgh: Section A Mathematics 117, nr 1-2 (1991): 109–14. http://dx.doi.org/10.1017/s0308210500027645.

Pełny tekst źródła
Streszczenie:
SynopsisA gp-toolkit consisting of computer implementations of various group theory methods, in particular a Tietze transformation program, was designed. Special cases of a conjecture were solved by the gp-toolkit. Examination of the method used by the gp-toolkit to deduce relations showed that a general approach had been employed. We present a proof verifying that the conjecture is true which is a straightforward generalisation of the method discovered by the gp-toolkit.
Style APA, Harvard, Vancouver, ISO itp.
21

Zhang, Cheng. "How to Deduce the Other 91 Valid Aristotelian Modal Syllogisms from the Syllogism IAI-3". Applied Science and Innovative Research 7, nr 1 (27.01.2023): p46. http://dx.doi.org/10.22158/asir.v7n1p46.

Pełny tekst źródła
Streszczenie:
This paper firstly formalizes Aristotelian modal syllogisms by taking advantage of the trisection structure of (modal) categorical propositions. And then making full use of the truth value definition of (modal) categorical propositions, the transformable relations between an Aristotelian quantifier and its three negative quantifiers, the reasoning rules of classical propositional logic, and the symmetry of the two Aristotelian quantifiers (i.e. some and no), this paper shows that at least 91 valid Aristotelian modal syllogisms can be deduced from IAI-3 on the basis of possible world semantics and set theory. The reason why these valid Aristotelian modal syllogisms can be reduced is that any Aristotelian quantifier can be defined by the other three Aristotelian quantifiers, and the necessary modality ( ) and possible modality ( ) can also be defined mutually. This research method is universal. This innovative study not only provides a unified mathematical research paradigm for the study of generalized modal syllogistic and other kinds of syllogistic, but also makes contributions to knowledge representation and knowledge reasoning in computer science.
Style APA, Harvard, Vancouver, ISO itp.
22

Couveignes, Jean-Marc, i Tony Ezome. "Computing functions on Jacobians and their quotients". LMS Journal of Computation and Mathematics 18, nr 1 (2015): 555–77. http://dx.doi.org/10.1112/s1461157015000169.

Pełny tekst źródła
Streszczenie:
We show how to efficiently evaluate functions on Jacobian varieties and their quotients. We deduce an algorithm to compute$(l,l)$isogenies between Jacobians of genus two curves in quasi-linear time in the degree$l^{2}$.
Style APA, Harvard, Vancouver, ISO itp.
23

LIONS, PIERRE-LOUIS. "AXIOMATIC DERIVATION OF IMAGE PROCESSING MODELS". Mathematical Models and Methods in Applied Sciences 04, nr 04 (sierpień 1994): 467–75. http://dx.doi.org/10.1142/s0218202594000261.

Pełny tekst źródła
Streszczenie:
We briefly review the derivation due to Alvarez, Guichard, Morel and the author of mathematical models in Image Processing. We deduce from classical axions in Computer Vision some nonlinear partial differential equations of evolution type that correspond to general multi-scale analysis (scale-space). We also obtain specific nonlinear models that satisfy additional invariances which are relevant for the analysis of images.
Style APA, Harvard, Vancouver, ISO itp.
24

Fu, T., Y. Du, Z. S. Zheng, Y. B. Peng, B. Jin, Y. B. Liu, C. F. Du, S. H. Liu, C. Y. Shi i J. Wang. "An effective algorithm to identify the miscibility gap in a binary substitutional solution phase". Journal of Mining and Metallurgy, Section B: Metallurgy 56, nr 2 (2020): 183–91. http://dx.doi.org/10.2298/jmmb190916004f.

Pełny tekst źródła
Streszczenie:
In the literature, no detailed description is reported about how to detect if a miscibility gap exists in terms of interaction parameters analytically. In this work, a method to determine the likelihood of the presence of a miscibility gap in a binary substitutional solution phase is proposed in terms of interaction parameters. The range of the last interaction parameter along with the former parameters is analyzed for a set of self-consistent parameters associated with the miscibility gap in assessment process. Furthermore, we deduce the first and second derivatives of Gibbs energy with respect to composition for a phase described with a sublattice model in a binary system. The Al-Zn and Al-In phase diagrams are computed by using a home-made code to verify the efficiency of these techniques. The method to detect the miscibility gap in terms of interaction parameters can be generalized to sublattice models. At last, a system of equations is developed to efficiently compute the Gibbs energy curve of a phase described with a sublattice model.
Style APA, Harvard, Vancouver, ISO itp.
25

Rosales, J. C., i P. A. García-Sánchez. "On the structure of simplicial affine semigroups". Proceedings of the Royal Society of Edinburgh: Section A Mathematics 130, nr 5 (październik 2000): 1017–28. http://dx.doi.org/10.1017/s030821050000055x.

Pełny tekst źródła
Streszczenie:
We give a structure theorem for simplicial affine semigroups. From this result we deduce characterizations of some properties of semigroup rings of simplicial affine semigroups. We also compute an upper bound for the cardinality of a minimal presentation of a simplicial affine semigroup.
Style APA, Harvard, Vancouver, ISO itp.
26

HEIL, SIMON. "JSJ DECOMPOSITIONS OF DOUBLES OF FREE GROUPS". Glasgow Mathematical Journal 62, nr 2 (2.05.2019): 367–82. http://dx.doi.org/10.1017/s0017089519000168.

Pełny tekst źródła
Streszczenie:
AbstractWe classify all possible JSJ decompositions of doubles of free groups of rank two, and we also compute the Makanin–Razborov diagram of a particular double of a free group and deduce that in general limit groups are not freely subgroup separable.
Style APA, Harvard, Vancouver, ISO itp.
27

Qiao, Xing, Dan Ma, Fu Zheng i Guangtian Zhu. "The Well-Posedness and Stability Analysis of a Computer Series System". Journal of Applied Mathematics 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/131076.

Pełny tekst źródła
Streszczenie:
A repairable computer system model which consists of hardware and software in series is established in this paper. This study is devoted to discussing the unique existence of the solution and the stability of the studied system. In view ofc0semigroup theory, we prove the existence of a unique nonnegative solution of the system. Then by analyzing the spectra distribution of the system operator, we deduce that the transient solution of the system strongly converges to the nonnegative steady-state solution which is the eigenvector corresponding to eigenvalue 0 of the system operator. Finally, some reliability indices of the system are provided at the end of the paper with a new method.
Style APA, Harvard, Vancouver, ISO itp.
28

Fu, Chen-Su, i Wann-Yih Wu. "Means-End Matrix and Deduction in Consumption Behavior Research". Methodology 9, nr 2 (1.05.2013): 54–68. http://dx.doi.org/10.1027/1614-2241/a000055.

Pełny tekst źródła
Streszczenie:
This study adopts matrix operations to deduce the logic of the means-end laddering approach and uses flowcharts to illustrate the steps in every laddering-matrix process. In addition to helping programmers understand the logic of means-end laddering for writing computer programs, these flowcharts also provide marketers with the main concepts of means-end chain (MEC) methodology in order to develop better marketing strategies. This study has three major contributions: (1) to propose improvements for constructing the cognitive hierarchies of consumer-product knowledge, (2) to alleviate the weakness of traditional MEC methodology, and (3) to provide the logic of laddering-matrix programming procedure to improve the design of MEC computer software.
Style APA, Harvard, Vancouver, ISO itp.
29

Arreche, Carlos E. "Computation of the difference-differential Galois group and differential relations among solutions for a second-order linear difference equation". Communications in Contemporary Mathematics 19, nr 06 (30.08.2017): 1650056. http://dx.doi.org/10.1142/s0219199716500565.

Pełny tekst źródła
Streszczenie:
We apply the difference-differential Galois theory developed by Hardouin and Singer to compute the differential-algebraic relations among the solutions to a second-order homogeneous linear difference equation [Formula: see text] where the coefficients [Formula: see text] are rational functions in [Formula: see text] with coefficients in [Formula: see text]. We develop algorithms to compute the difference-differential Galois group associated to such an equation, and show how to deduce the differential-algebraic relations among the solutions from the defining equations of the Galois group.
Style APA, Harvard, Vancouver, ISO itp.
30

Randriamaro, Hery. "The Tutte polynomial of ideal arrangements". Discrete Mathematics, Algorithms and Applications 12, nr 02 (13.01.2020): 2050017. http://dx.doi.org/10.1142/s1793830920500172.

Pełny tekst źródła
Streszczenie:
The Tutte polynomial was originally a bivariate polynomial enumerating the colorings of a graph and of its dual graph. But it reveals more of the internal structure of the graph like its number of forests, of spanning subgraphs, and of acyclic orientations. In 2007, Ardila extended the notion of Tutte polynomial to hyperplane arrangements, and computed the Tutte polynomials of the classical root systems for certain prime powers of the first variable at the same time. In this paper, we compute the Tutte polynomial of ideal arrangements. These arrangements were introduced in 2006 by Sommers and Tymoczko, and are defined for ideals of root systems. For the ideals of classical root systems, we bring a slight improvement of the finite field method by showing that it can applied on any finite field whose cardinality is not a minor of the matrix associated to the studied hyperplane arrangement. Computing the minor set associated to an ideal of classical root systems particularly permits us to deduce the Tutte polynomials of the classical root systems. For the ideals of the exceptional root systems of type [Formula: see text], [Formula: see text], and [Formula: see text], we use the formula of Crapo.
Style APA, Harvard, Vancouver, ISO itp.
31

Blagić, Dragan, i Zdravko Grujić. "Criminal Law protection of sexual integrity of a child". Bezbednost, Beograd 65, nr 3 (2023): 83–106. http://dx.doi.org/10.5937/bezbednost2303083b.

Pełny tekst źródła
Streszczenie:
Criminal law protection of a child from sexual violence is very complex in nature and is achieved by prescribing crimes against sexual freedom. In the Serbian criminal legislation, in most criminal offenses, protection is provided for their qualified, i.e. more serious, form. Violation of the sexual integrity of a child in the form of sexual exploitation and abuse is one of the most serious, inhumane, crimes. Systematic study of the phenomenon of endangering the sexual freedom and integrity of child undoubtedly represents a supranational problem and overcomes the mutual social, cultural, religious and other differences of individual states. Criminal law protection is achieved by prescribing certain behaviors as criminal acts, i.e. by stipulating when certain human behaviors can be considered punishable and under what conditions, as well as by prescribing penalties for such acts. It is the most vulnerable category (child) that is placed in a special position according to which sexual freedoms and integrity are most seriously violated and endangered, which inevitably requires initiation of criminal proceedings in order to protect them. On the one hand, in the modern criminal legislation, the legal incrimination is expanding in most criminal acts when it comes to children, because, on the other hand, the number of criminal acts committed to the detriment of children is increasing. In support of this is the fact that the adopted Law on Amendments to the Criminal Code from 2009, in the chapter against sexual freedom, criminalized two new crimes: inducing a child to attend sexual acts (Article 185a) and abuse of computer networks and other technical means of communication for committing crimes against sexual freedom against a minor (Article 185b). The original text of the Criminal Code also contains incriminations of Rape ((Article 178), Sexual Intercourse through Abuse of Position (Article 179), Sexual Intercourse with a Child (Article 180), Showing, Procuring and Possessing Pornographic Material and Minor Person Pornography (Article 185) which provide protection of the child's sexual integrity. The paper analyzes criminal acts that provide basic and additional protection of the child's sexual integrity, but also examines the compliance of new normative solutions with relevant international legal documents in this area, primarily with the Council of Europe Convention on the Protection of Children from Sexual Abuse and Sexual Exploitation.
Style APA, Harvard, Vancouver, ISO itp.
32

A. Olabanji, Ojo, Babafemi E. Olumuyiwa, Solomon Jekayinfa M., Emmanuel Faleye T. i Ayodele Ajayi J. "Multi-criteria assessment of groundwater potential of shallow aquifers in the vicinity of Osun state university, Ikire campus and environs, southwestern Nigeria". KIU journal of science engineering and technology 3, nr 1 (19.05.2024): 86–99. http://dx.doi.org/10.59568/kjset-2024-3-1-09.

Pełny tekst źródła
Streszczenie:
In order to investigate the groundwater potentials of shallow water-bearing layers within the vicinity of the Osun State University Campus at Ikire, fifteen vertical electrical sounding (VES) resistivity data were acquired at random. The groundwater potential of the shallow water-bearing layers was inferred from the resistivity data based on three (3) existing criteria namely aquifer resistivity, transmissivity and reflective coefficient. At each VES station, the maximum electrode spreading employed for the resistivity data acquisition was between 200 m and 240 m, with the interpretation of the data carried out using partial curve-matching and computer iterative software. Geoelectric parameters obtained were used to compute the longitudinal conductance, transverse resistance, hydraulic conductivity, transmissivity and reflective coefficient using empirical relationships. The computed parameters were compared with existing classification tables to deduce the groundwater propensity in the shallow water-bearing layers of the study area. Four to five geoelectric layers corresponding to the HQ, HA and HKA geoelectric curve types were observed having lateritic materials as topsoil, sandy clay/clayey sand, weathered/fractured basement and fresh basement. In most cases, the water-bearing layer is mostly of clayey material with high porosity and low permeability and resistivity values that varies from 14.6 Ωm in VES 1 to 65.6 Ωm in VES 6. A few consist of sandy clay also with low resistivity values 76.9 Ωm in VES 7 to 107.1 Ωm in VES 4. The transmitivity values vary from 0.239 m2/day in VES 2 to 2.522 m2/day in VES 5. This same behavior was observed with reflective coefficient values which range from 0.690 in VES 6 to 0.994 in VES 1. The conclusions from the classification tables correlate in most of the VES stations. This study shows that the groundwater potential of the shallow water-bearing layers in the study area is generally poor within 0 to 80 m depth due to the low transmissivity of the clay materials at the shallow depths. Effective groundwater development in the study area must therefore integrate geophysical methods and remote sensing techniques to investigate depths beyond 100 m.
Style APA, Harvard, Vancouver, ISO itp.
33

Magnin, Louis. "About Zero Torsion Linear Maps on Lie Algebras". ISRN Algebra 2011 (17.07.2011): 1–16. http://dx.doi.org/10.5402/2011/930189.

Pełny tekst źródła
Streszczenie:
We prove that any zero torsion linear map on a nonsolvable real Lie algebra is an extension of some CR-structure. We then study the cases of (2, ) and the 3-dimensional Heisenberg Lie algebra . In both cases, we compute up to equivalence all zero torsion linear maps on , and deduce an explicit description of the equivalence classes of integrable complex structures on .
Style APA, Harvard, Vancouver, ISO itp.
34

Breslow, Alex D., Ananta Tiwari, Martin Schulz, Laura Carrington, Lingjia Tang i Jason Mars. "Enabling Fair Pricing on High Performance Computer Systems with Node Sharing". Scientific Programming 22, nr 2 (2014): 59–74. http://dx.doi.org/10.1155/2014/906454.

Pełny tekst źródła
Streszczenie:
Co-location, where multiple jobs share compute nodes in large-scale HPC systems, has been shown to increase aggregate throughput and energy efficiency by 10–20%. However, system operators disallow co-location due to fair-pricing concerns, i.e., a pricing mechanism that considers performance interference from co-running jobs. In the current pricing model, application execution time determines the price, which results in unfair prices paid by the minority of users whose jobs suffer from co-location. This paper presents POPPA, a runtime system that enables fair pricing by delivering precise online interference detection and facilitates the adoption of supercomputers with co-locations. POPPA leverages a novel shutter mechanism – a cyclic, fine-grained interference sampling mechanism to accurately deduce the interference between co-runners – to provide unbiased pricing of jobs that share nodes. POPPA is able to quantify inter-application interference within 4% mean absolute error on a variety of co-located benchmark and real scientific workloads.
Style APA, Harvard, Vancouver, ISO itp.
35

Hu, Fu-Tao. "Maximum Independent Sets Partition of (n,k)-Star Graphs". Complexity 2019 (4.07.2019): 1–6. http://dx.doi.org/10.1155/2019/8247419.

Pełny tekst źródła
Streszczenie:
The (n,k)-star graph is a very important computer modelling. The independent number and chromatic number of a graph are two important parameters in graph theory. However, we have not known the values of these two parameters of the (n,k)-star graph since it was proposed. In this paper, we show a maximum independent sets partition of (n,k)-star graph. From that, we can immediately deduce the exact value of the independent number and chromatic number of (n,k)-star graph.
Style APA, Harvard, Vancouver, ISO itp.
36

Larson, T. H., i A. T. Hsui. "An analytical study of a two‐layer transient thermal conduction problem as applied to soil temperature surveys". GEOPHYSICS 57, nr 2 (luty 1992): 306–12. http://dx.doi.org/10.1190/1.1443244.

Pełny tekst źródła
Streszczenie:
The soil temperature survey is an inexpensive exploration method in groundwater and geothermal resource investigations. In its simplest form, temperatures measured in shallow holes are analyzed to deduce variations in material properties. Typical interpretation schemes are based on simple, one‐layer solutions to the Fourier conduction equation using the annual solar cycle as a surface heat source. We present a solution to the more complicated two‐layer problem that can be computed using inexpensive personal computers and spreadsheet software. The most demanding mathematical requirement is the ability to manipulate a [Formula: see text] matrix. Testing the solution over a range of thermal diffusivity values expected in common soils and rocks reveals that the solution is very sensitive to variations in the thermal diffusivity of the surface layer and to the depth of the interface with the lower layer. When the boundary to the lower layer is less than about 10 m deep, a soil temperature survey is expected to be sensitive to the diffusivity variations in the lower layer. Because variations in shallow thermal properties often can be significant, this two‐layer method should be useful in areas with distinct shallow layering, (e.g., where there is a shallow water table or a thin soil layer).
Style APA, Harvard, Vancouver, ISO itp.
37

Fournier, Clarisse, Marc Michard i Françoise Bataille. "Heat Transfer in a Laminar Channel Flow Generated by Injection Through Porous Walls". Journal of Fluids Engineering 129, nr 8 (18.03.2007): 1048–57. http://dx.doi.org/10.1115/1.2746908.

Pełny tekst źródła
Streszczenie:
Steady state similarity solutions are computed to determine the temperature profiles in a laminar channel flow driven by uniform fluid injection at one or two porous walls. The temperature boundary conditions are non-symmetric. The numerical solution of the governing equations permit to analyze the influence of the governing parameters, the Reynolds and Péclet numbers. For both geometries, we deduce a scaling law for the boundary layer thickness as a function of the Péclet number. We also compare the numerical solutions with asymptotic expansions in the limit of large Péclet numbers. Finally, for non-symmetric injection, we derive from the computed temperature profile a relationship between the Nusselt and Péclet numbers.
Style APA, Harvard, Vancouver, ISO itp.
38

Umar, Dr Syed Abudhagir, Chenigaram Abhigna, Cheemalapati Vignesh i Teki Rohith Raj. "Lung Cancer Detection using CT Scan Images". International Journal of Engineering and Advanced Technology 12, nr 1 (30.10.2022): 1–5. http://dx.doi.org/10.35940/ijeat.a3775.1012122.

Pełny tekst źródła
Streszczenie:
Lung cancer is a fatal disease that takes numerous lives every year around the world. However, detecting this disease in its initial stages can help save the lives of the people. CT imaging is the best technique used for imaging in the field of medical sciences. It is used by doctors but it is hard for medical examiners to decipher and recognize cancer through the computer-assisted tomography scan images. Hence, Computer-aided diagnosiswill be very supportive for the medical examiners to identify and recognize the cancerous nodules in cells precisely. The primary agenda of the project is to assess diverse computer based methods, explore present finest method, deduce its limitations and setbacks. Then, proposing a latest model with upgrades and advancements to the present leading model. Techniques appliedfor diagnosis of lung cancerare organized based on theprecision. Numerous methods were surveyedon everystride and the complete limitations and setbacks were identified. A lot of techniques had low precision and few had high precision. But none of those were satisfying. Therefore, our target is to increase the precision of themodel.
Style APA, Harvard, Vancouver, ISO itp.
39

Metwally, Amal Abdelsattar, i Dalal Mahmoud Elgemei. "A Corpus-based Grammatical Investigation towards a Computational Identification of Metaphor". IJELTAL (Indonesian Journal of English Language Teaching and Applied Linguistics) 6, nr 2 (15.05.2022): 227. http://dx.doi.org/10.21093/ijeltal.v6i2.1100.

Pełny tekst źródła
Streszczenie:
The present study is a corpus-based grammatical investigation for the computational identification of metaphors. The aim of the study is to set a grammatical criterion for the computational identification of metaphors in the Holy Qur’ān and propose a computer software input rule for the grammatical identification of metaphorical candidates. The work presented in this study draws on the cognitive theory of metaphor (Lakoff and Johnson, 1980), authentic exegeses of the Holy Qur’ān, and finally and most significantly it draws on and extends techniques from computational linguistics. The corpus of the study is one surah from the Holy Qur’ān, Sūrat Hūd. A methodology for the investigation of candidate metaphor grammatical structure was developed to deduce the grammatical markers of metaphor and utilize them in the computational identification of metaphors. A quantitative and qualitative interpretation of these results and how they can contribute to the computer software suggested for a computer identification of metaphor in the Holy Qur’ān is made. The study ended with a theoretical framework that was applied to the corpus to find metaphors by findings specific grammatical markers.
Style APA, Harvard, Vancouver, ISO itp.
40

Sundt, Bjørn, i Jan Dhaene. "On Bounds for the Difference Between the Stop-Loss Transforms of Two Compound Distributions". ASTIN Bulletin 26, nr 2 (listopad 1996): 225–31. http://dx.doi.org/10.2143/ast.26.2.563221.

Pełny tekst źródła
Streszczenie:
AbstractIn the present note we deduce a class of bounds for the difference between the stop-loss transforms of two compound distributions with the same severity distribution. The class contains bounds of any degree of accuracy in the sense that the bounds can be chosen as close to the exact value as desired; the time required to compute the bounds increases with the accuracy.
Style APA, Harvard, Vancouver, ISO itp.
41

Gururaj, Vaishnavi, Shriya Varada Ramesh, Sanjana Satheesh, Ashwini Kodipalli i Kusuma Thimmaraju. "Analysis of deep learning frameworks for object detection in motion". International Journal of Knowledge-based and Intelligent Engineering Systems 26, nr 1 (8.06.2022): 7–16. http://dx.doi.org/10.3233/kes-220002.

Pełny tekst źródła
Streszczenie:
Object detection and recognition is a computer vision technology and is considered as one of the challenging tasks in the field of computer vision. Many approaches for detection have been proposed in the past. AIM: This paper is mainly aiming to discuss the existing detection and classification techniques of Deep Convolutional Neural Networks (CNN) with an importance placed on highlighting the training and accuracy of the different CNN models. METHODS: In the proposed work, Faster RCNN, YOLO and SSD are used to detect helmets. OUTCOME: The survey says MobileNets has higher accuracy when compared to VGG16, VGG19 and Inception V3 and is therefore chosen to be used with SSD. The impact of the differences in the amount of training of each algorithm is highlighted which helps understand the advantages and disadvantages of each algorithm and deduce the most suitable.
Style APA, Harvard, Vancouver, ISO itp.
42

Kim, Eui Soo. "Accident Reconstruction of Damaged Human Body Using MDCT and Computer Numerical Analysis". Applied Sciences 10, nr 9 (28.04.2020): 3059. http://dx.doi.org/10.3390/app10093059.

Pełny tekst źródła
Streszczenie:
Techniques to analyze damage to a human body provide an important foundation to investigate the human body’s dynamics during accidents. However, the systematic investigation and analysis of accidents’ causes are limited due to a lack of suitable technology, personnel, and equipment. Recently, 3-D technologies and engineering verification through the finite element method have become widespread in forensics to investigate accidents’ causes and dynamic environments. Bone fracture analyses can provide important information on how victims may have died and injured. In this study, 3-D images obtained from multi-detector computed tomography of personal injuries and closed-circuit television, as well as image analyses based on forensic investigations, are used in a finite element program to analyze how ribs are broken during an accident and the possibility of further body damage. Technologies that deduce stress states and mechanisms are also developed in this study using FE analyses of the reconstructed model.
Style APA, Harvard, Vancouver, ISO itp.
43

AROCA, FUENSANTA, GIOVANNA ILARDI i LUCÍA LÓPEZ DE MEDRANO. "PUISEUX POWER SERIES SOLUTIONS FOR SYSTEMS OF EQUATIONS". International Journal of Mathematics 21, nr 11 (listopad 2010): 1439–59. http://dx.doi.org/10.1142/s0129167x10006574.

Pełny tekst źródła
Streszczenie:
We give an algorithm to compute term-by-term multivariate Puiseux series expansions of series arising as local parametrizations of zeroes of systems of algebraic equations at singular points. The algorithm is an extension of Newton's method for plane algebraic curves, replacing the Newton polygon by the tropical variety of the ideal generated by the system. As a corollary we deduce a property of tropical varieties of quasi-ordinary singularities.
Style APA, Harvard, Vancouver, ISO itp.
44

Zheng, Jiaoyue, Xiaomin Ji, Zhaozhao Ma i Gang Hu. "Construction of Local-Shape-Controlled Quartic Generalized Said-Ball Model". Mathematics 11, nr 10 (19.05.2023): 2369. http://dx.doi.org/10.3390/math11102369.

Pełny tekst źródła
Streszczenie:
Said-Ball curves and surfaces are extensively applied in the realm of geometric modeling. Their appearance is only decided by the control points, which produces a great deal of inconvenience for the shape design of sophisticated products. To overcome this defect, we construct a novel kind of quartic generalized Said-Ball (QGS-Ball, for short) curves and surfaces, which contain multiple shape parameters, and the global and local shape can be easily modified via shape parameters. The specific research contents are as follows: Firstly, the QGS-Ball basis functions carrying multiple shape parameters are defined, and the correlative properties are proved. Secondly, the QGS-Ball curve is proposed according to the QGS-Ball basis functions, and the effect of shape parameters on the curve is discussed. Thirdly, in view of the constructed QGS-Ball curve, we further propose the combined quartic generalized Said-Ball (CQGS-Ball, for short) curves, and deduce the conditions of first-order and second-order geometric continuity (namely, G1 and G2 continuity). Finally, the QGS-Ball surface is defined by tensor product method, and the influence of shape parameters on the surface is analyzed. The main contribution of this article is to construct the QGS-Ball curve model, and deduce the G1 and G2 geometric joining conditions of QGS-Ball curves. Combined with some modeling examples, it further illustrates that the QGS-Ball curve as a new geometric model provides a powerful supplement for the geometric design of sophisticated form in computer-aided design (CAD) and computer-aided manufacturing (CAM) systems.
Style APA, Harvard, Vancouver, ISO itp.
45

Stojković, Branislava, Marija Igić, Olivera Tričković-Janjić, Milica Petrović, Predrag Janošević, Marija Jovanović i Ana Igić. "Caries risk profile of preschool children in the City of Niš". Acta stomatologica Naissi 36, nr 81 (2020): 1946–56. http://dx.doi.org/10.5937/asn2081946s.

Pełny tekst źródła
Streszczenie:
Introduction: Primary caries prevention from the earliest childhood has multiple significance. Its efficacy is largely conditioned by the knowledge of the caries risk profile of the subpopulation at risk, as an important prerequisite for developing effective strategies and measures for disease prevention and control. Aim: To assess the caries risk profile of preschool children in the City of Niš using a reduced computer Cariogram ® model. Material and methods: To realize the set objectives, a cross-sectional study was conducted, which included preschool children, aged 36-48 months, with permanent residence in the City of Niš since birth. The collection of data was done by interviewing mothers, and by the clinical examination of subjects. The caries risk profile of the subjects was performed using a reduced Cariogram ® model. Results: The study included 276 subjects of preschool age, mean age 41.28 ± 4.40 months. The highest percentage of subjects has a moderate caries risk, with an average of 50% chance of avoiding a new carious lesion in the future. In the assessed caries risk profile of children, the most vulnerable sectors are "susceptibility" (18%) and "bacteria" (14%), related to the use of fluoride by children of this age and their oral hygiene. The highest percentage of subjects belongs to the moderate caries risk group. Conclusion: According to the conducted study, insufficient exposure of teeth to fluoride and inadequate oral hygiene may be considered significant caries risk factors in preschool children, which should be considered when choosing measures and strategies for disease prevention and control. Also, it is necessary to reconsider the time of diagnostic examinations to reduce the prevalence of caries and its negative consequences at this age to a minimum.
Style APA, Harvard, Vancouver, ISO itp.
46

Abbes, Ahmed, i Takeshi Saito. "Local Fourier transform and epsilon factors". Compositio Mathematica 146, nr 6 (5.08.2010): 1507–51. http://dx.doi.org/10.1112/s0010437x09004631.

Pełny tekst źródła
Streszczenie:
AbstractLaumon introduced the local Fourier transform forℓ-adic Galois representations of local fields, of equal characteristicpdifferent fromℓ, as a powerful tool for studying the Fourier–Deligne transform ofℓ-adic sheaves over the affine line. In this article, we compute explicitly the local Fourier transform of monomial representations satisfying a certain ramification condition, and deduce Laumon’s formula relating the ε-factor to the determinant of the local Fourier transform under the same condition.
Style APA, Harvard, Vancouver, ISO itp.
47

Westerholt-Raum, Martin. "Formal Fourier Jacobi expansions and special cycles of codimension two". Compositio Mathematica 151, nr 12 (6.08.2015): 2187–211. http://dx.doi.org/10.1112/s0010437x15007514.

Pełny tekst źródła
Streszczenie:
We prove that formal Fourier Jacobi expansions of degree two are Siegel modular forms. As a corollary, we deduce modularity of the generating function of special cycles of codimension two, which were defined by Kudla. A second application is the proof of termination of an algorithm to compute Fourier expansions of arbitrary Siegel modular forms of degree two. Combining both results enables us to determine relations of special cycles in the second Chow group.
Style APA, Harvard, Vancouver, ISO itp.
48

Griffin, Frank W., i Lillie Anderton-Lewis. "Enhancing Connections Between Students and Instructors: African-American Students' Use of Computer-Mediated Communication". Business Communication Quarterly 61, nr 2 (czerwiec 1998): 9–19. http://dx.doi.org/10.1177/108056999806100203.

Pełny tekst źródła
Streszczenie:
The move to incorporate computer-mediated communication (CMC) into the business curriculum is driven by job market demands for information technol ogy skills. Business instructors may discover, however, a pedagogical bonus: more communication with their students outside the classroom. We studied the perceptions and practices of 138 students in business communications at one of the historically black colleges and universities who used e-mail and the Internet to complete assignments. The results indicate that CMC encouraged students to become active learners and to contact instructors. Anecdotal evi dence suggests that e-mail helps African-American students to see instructors as facilitators, though it does not necessarily become a rhetorical "safe house," where students engage in vernacular discourse. Nevertheless, e-mail fosters an informal rhetorical relationship that rewards openness and collaboration among students and instructors within the formal academic setting.
Style APA, Harvard, Vancouver, ISO itp.
49

Hartnup, G. C., i R. G. Airey. "Model Tests on Multi-Tube Production Risers". Journal of Offshore Mechanics and Arctic Engineering 113, nr 1 (1.02.1991): 9–13. http://dx.doi.org/10.1115/1.2919904.

Pełny tekst źródła
Streszczenie:
Model tests carried out at 1/14.5 scale on two production risers in a towing tank are described. One of the risers considered is modeled on that used in the Buchan field, while the other has a compact low drag configuration of the same production capacity. The tensioning system was carefully modeled, and vessel surge motions were accurately represented in both regular and irregular waves. Current was represented by carriage motion. Some results are presented for bending moments and displacements for both models and comparisons are made with computer simulations to deduce appropriate values for hydrodynamic coefficients.
Style APA, Harvard, Vancouver, ISO itp.
50

Karapınar, Erdal, Salvador Romaguera i Pedro Tirado. "Characterizations of quasi-metric and G-metric completeness involving w-distances and fixed points". Demonstratio Mathematica 55, nr 1 (1.01.2022): 939–51. http://dx.doi.org/10.1515/dema-2022-0177.

Pełny tekst źródła
Streszczenie:
Abstract Involving w w -distances we prove a fixed point theorem of Caristi-type in the realm of (non-necessarily T 1 {T}_{1} ) quasi-metric spaces. With the help of this result, a characterization of quasi-metric completeness is obtained. Our approach allows us to retrieve several key examples occurring in various fields of mathematics and computer science and that are modeled as non- T 1 {T}_{1} quasi-metric spaces. As an application, we deduce a characterization of complete G G -metric spaces in terms of a weak version of Caristi’s theorem that involves a G-metric version of w-distances.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii