نتایج جستجو برای: length of delay

تعداد نتایج: 21183748  

2017

This study utilizes data from a large sample of police records to examine the relationship between reporting delay and pre-trial criminal justice outcomes for child and adult reporters of CSA. Analyses show that the presence and length of reporting delay significantly influences outcomes for child reporters, with teenagers particularly benefitting from immediate reporting. Length of delay was n...

2006
Canfeng Chen Jian Ma Ke Yu

Mobile enable Wireless Sensor Network (mWSN) has been proposed to realize large-scale information gathering via networking wireless sensors and mobile sinks. Some fundamental design parameters in mWSN have been investigated in this article, such as cluster size, sink velocity, transmission range, and packet length. Our contributions include: 1) We propose to use multihop forwarding to form a cl...

Journal: :The Quarterly journal of experimental psychology. A, Human experimental psychology 2002
Alan Baddeley Dino Chincotta Lorenzo Stafford David Turk

Although it is generally accepted that the word length effect in short-term memory operates through output delay or interference, there is less agreement on whether it also influences performance through its impact on rehearsal. We investigated this issue by studying the effect of word length on recall and on a recognition task in which output delay was controlled. Word sequences were repeated ...

2007
Haizhou Chen Eugene Shragowitz Jaebum Lee

In this paper, a methodology for computation of bounds on MCM and PCB net length and width consistent with timing and noise constraints is proposed. In this method, The initial length and width of each net are used for the AWEbased simulation. For the simulated length and width of the line, the delay and overshoot at receivers are expanded in the form of multi-variable Taylor series of length/w...

Journal: :IBM Journal of Research and Development 2006
Nicholas P. Carter Azmat Hussain

We present Justice, a set of extensions to the Liberty simulation infrastructure that model area, wire length, and power consumption in processor architectures. Given an architectural specification of a processor, Justice estimates the area of each module of the processor and generates a floorplan of the processor. From the floorplan, Justice computes the length and delay of critical communicat...

2001
Herbert G. Winful

Tunneling without distortion is not a propagation phenomenon but a quasistatic process in which the slowly varying envelope of the input pulse modulates the amplitude of a standing wave in the barrier. Because the envelope has a bandwidth that is small compared to the cutoff frequency of the barrier it does not propagate; it merely stands and waves. The envelope of the reflected and transmitted...

2016
K. Prasanna Lakshmi P. Parvathi

In this study a deterministic inventory model for deteriorating items with stock dependent demand is developed. In this model the shortages are allowed and partially backlogged and the effect of inflation rate and delay in payments are discussed. This paper establishes an inventory model for the deteriorating items and stock dependent demand rate under inflation when the supplier offers a permi...

2013
Suoping Li Yongqiang Zhou

Selective-Repeat ARQ (Automatic Repeat reQuest) protocol is the most efficient error control technology in wireless because it allows the transmitter to retransmit only negatively acknowledges (NACK) packets. In this paper, by analyzing the transmission mechanism of SR-ARQ, the discrete-time Geom/G/1/ queue model is established sententiously based on equivalent delay under the condition that th...

2016
Mahdi Alinaghizadeh Ardestani

Many real-time applications use Internet as a media to transmit their data and need guarantee for correct data transmission and limited transmission delay. It requires efficient network traffic protocols to avoid or limit the level of congestion. In this paper we propose, design and analyze a Robust Delay Based Controller (RDBC) for traffic management on transmission control protocol (TCP). Thi...

شفیعی, مسعود, نیکخو, محمد , کیانی, کوروش ,

In this paper, the concept of secure synchronization of chaotic systems using adaptive and robust techniques , has been discussed and then a new secure communication scheme, based on secure synchronization of a general class of chaotic systems called Generalized Lorenz System, are presented. This communication scheme is combination of conventional cryptographic methods and chaotic modulation me...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید