نتایج جستجو برای: tiny jop

تعداد نتایج: 10218  

2015
James O. Phillips Leo Ling Kaibao Nie Elyse Jameyson Christopher M. Phillips Amy L. Nowack Justin S. Golub Jay T. Rubinstein

1 2 Vestibular Implantation and Longitudinal Electrical Stimulation of the Semicircular Canal 3 Afferents in Human Subjects 4 5 6 James O. Phillips 1,3,4 , Leo Ling 1,3 , Kaibao Nie 1,4 , Elyse Jameyson 1 , Christopher M. Phillips 1,3 , 7 Amy L. Nowack 1,3 , Justin S. Golub 1 , and Jay T. Rubinstein 1,2,3,4 8 9 10 Department of Otolaryngology-HNS 1 , Department of Bioengineering 2 , National Pr...

2008
Steven E. Czerwinski F. R. Morgenthaler Steve Milligan

In this thesis, I designed and implemented a new approach of applying Genetic Algorithms to the Jop-Shop Scheduling Problem. In my implementation, I created a population mechanism which uses genocide to maintain solution diversity, and an elite population of superior solutions to improve search time and overall results. My chromosome representation assigns priorities to each operation to be sch...

2006
Sarosh J. Motivala John Sollers Julian Thayer Michael R. Irwin

Method. The sample included two groups of older men and women (age 60 years): TCC practitioners (n 1⁄4 19) and TCC-naı̈ve participants (n1⁄413). Participants were recruited after completing a 25-week randomized trial of TCC or health education. TCC practitioners performed TCC for 20 minutes, and TCC-naı̈ve participants passively rested. Preejection period, blood pressure, and heart rate were meas...

Journal: :JSW 2014
Lei Yuan Shiying Yang Dewang Chen Kaicheng Li

Chinese Train Control System level three (CTCS3) is a major technical system in Chinese high-speed rail and Train Control System (TCC) is indispensable component in the CTCS-3. Current researches on TCC are mainly based on the simulation, which cannot ensure that all conditions in TCC are tested. This paper presents a hierarchical modeling method and uses time automation (TA) to model the TCC s...

2012
Jochen Rick

Everyday computing technology is transitioning from desktop computing to interactive surfaces. At the forefront of this technological revolution are multi-touch tablets. Each year, tablets become more affordable, more capable and more widespread. Now is the time for research to shape how they will be used to support learning. In this position paper, I propose a learning sciences research agenda...

Journal: :IEEE Data Eng. Bull. 2007
Michael J. Franklin Joseph M. Hellerstein Samuel Madden

Work on early tiny database systems, like TinyDB [17] and Cougar [23] has shown that a declarative approach can provide a powerful and easy to use interface for collecting data from static sensor networks. These early systems, however, have significant limitations; in particular, they are useful only for low-rate data collection applications on static sensor networks and they don’t integrate we...

A R Mehdizadeh Gh Mortazavi, S A R Mortazavi,

A large body of evidence now indicates that the amount of mercury released from dental amalgam fillings can be significantly accelerated by exposure to radiofrequency electromagnetic fields (RF-EMFs) such as common mobile phones and magnetic resonance imaging (MRI). Studies performed on the increased microleakage of dental amalgam restorations after exposure to RF-EMFs have further supported th...

Journal: :JNW 2008
Glenn Platt Joshua Wall Philip Valencia John K. Ward

CSIRO is using wireless sensor network technology to deploy " tiny agents " , working as autonomous controllers for individual pieces of electrical load/generation equipment in a distributed energy system. The tiny agent concept is a novel application of wireless sensor networks, providing the benefits of multi-agent systems science in a cheap, mobile, and highly distributable platform. However...

2015
Shashank Agrawal Divya Gupta Hemanta K. Maji Omkant Pandey Manoj Prabhakaran

A non-malleable code protects messages against a class of tampering functions. Informally, a code is non-malleable if the effect of applying any tampering function on an encoded message is to either retain the message or to replace it with an unrelated message. Two main challenges in this area – apart from establishing the feasibility against different families of tampering – are to obtain expl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید