نتایج جستجو برای: end to end

تعداد نتایج: 10658428  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی (نوشیروانی) بابل - دانشکده مهندسی مکانیک 1389

due to the limiting workspace of parallel manipulator and regarding to finding the trajectory planning of singularity free at workspace is difficult, so finding a best solution that can develop a technique to determine the singularity-free zones in the workspace of parallel manipulators is highly important. in this thesis a simple and new technique are presented to determine the maximal singula...

2003
M. Jleli

The theory of constant mean curvature surfaces in Euclidean space has been the object of intensive study in the past years. In the case of complete noncompact constant mean curvature surfaces, the moduli space of such surfaces is now fairly well understood (at least in the genus 0 case) [13], [10], [11] and many technics have been developed to produce examples of such surfaces [8], [5], [14], [...

2017
Jayanth R. Banavar A. Brooks Harris Joel Koplik

Unrestricted lattice random walks in which a unit conductor is placed along each bond traversed are considered. The mean end-to-end resistance is studied as a function of the number of steps in the walk and the spatial dimension. A critical scaling law is found whose exponent is consistently given by four different calculational schemes.

2002
Michael Droettboom Ichiro Fujinaga Karl MacMillan

A system to convert digitized sheet music into a symbolic music representation is presented. A pragmatic approach is used that conceptualizes this primarily two-dimensional structural recognition problem as a one-dimensional one. The transparency of the implementation owes a great deal to its implementation in a dynamic, object-oriented language. This system is a part of a locally developed end...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی 1391

the study of air infiltration into the buildings is important from several perspectives that may be noted to energy and design of hvac systems, indoor air quality and thermal comfort and design of smoke control systems. given the importance of this issue, an experimental and numerical study of air infiltration through conventional doors and windows has been explored in iran. to this end, at fir...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده زبانهای خارجی 1392

to teach english adequately, qualified teachers are needed. unfortunately, there are still teachers who are teaching english without an academic degree in tefl. it is necessary for teachers to have a major in english to have subject knowledge, but it is not sufficient. teachers need to have an understanding of the social, cultural, moral, ethical, and pedagogical issues of education and practic...

Journal: :Annales des Télécommunications 2006
Armando L. Caro Paul D. Amer Randall R. Stewart

Using the application of bulk data transfer, we investigate end-to-end failover mechanisms and thresholds for transport protocols that support multihoming (e.g., SCTP). First, we evaluate temporary failovers, and measure the tradeoff between aggressive (i.e., lower) thresholds and spurious failovers. We surprisingly find that spurious failovers do not degrade performance, and often actually imp...

1999
Herve Le Pocher Victor C.M. Leung Donald Gillies

A high performance, frame-based, real-time ATM scheduler is proposed for the wireless multimedia environment. We Ž . introduce the Delayed Frame Queueing DFQ scheduling protocol which only defines the service priorities, deadlines and eligibility times of queued cells. The DFQ protocol does not define the particular fashion in which a mobile or base station gains access to the shared transmissi...

2005
S. Tachimoto

A Session Initiation Protocol (SIP) User Agent (UA) does not always trust all intermediaries in its request path to inspect its message bodies and/or headers contained in its message. The UA might want to protect the message bodies and/or headers from intermediaries, except those that provide services based on its content. This situation requires a mechanism called "end-to-middle security" to s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید