نتایج جستجو برای: overhead

تعداد نتایج: 31866  

Journal: :Research Letters in Communications 2008

Journal: :Quantum Information and Computation 2012

Journal: :Orthopaedic Journal of Sports Medicine 2015

This paper proposes a simple but efficient technique to control 3D overhead crane. Load must track a desired path and not sway more than a reasonable range.The proposed method uses PID control for trolley to track the desired path and fuzzy control compensation to eliminate the load swing. Only the projection of swing angle is applied to design the fuzzy controller. No plant information of cran...

ژورنال: Physical Treatments 2021

Introduction: The shoulder joint is one of the most commonly injured joints in sports and may lead to disability, especially in the upper extremities of overhead players (handball, volleyball, softball, and swimming). Participants and Methods: This research is a causal-comparative study. After the approval of the Ethics Committee of the Medical University of Tehran, this study was conducted on...

A. Gholami and M. Mirzai,

Overhead transmission lines are influenced by different factors which are mostly electrical and mechanical. These factors can cause problems for lines, distortions in network and outage of line. In designing transmission lines mechanical properties are evaluated after selecting a suitable conductor and clearance with regard to electrical properties. In lines designing, an important mechanical p...

1990
Baruch Awerbuch David Peleg

The synchronizer is a simulation methodology for simulating a synchronous network by an asynchronous one, thus enabling the execution of a synchronous algorithm on an asynchronous network. Previously known synchronizers require each processor in the entire network G(V; E) to participate in each pulse of the synchronization process. As a result, the communication overhead of existing synchro-niz...

Journal: :IACR Cryptology ePrint Archive 2012
Eike Kiltz Krzysztof Pietrzak Mario Szegedy

In a digital signature scheme with message recovery, rather than transmitting the message m and its signature σ, a single enhanced signature τ is transmitted. The verifier is able to recover m from τ and at the same time verify its authenticity. The two most important parameters of such a scheme are its security and the overhead |τ | − |m|. A simple argument shows that for any scheme with “n bi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید