نتایج جستجو برای: Winkler Bed
تعداد نتایج: 50463 فیلتر نتایج به سال:
The history of fluidized bed technology dates back 60 years. Gasification of pulverized coal in the Winkler process during the 1920's marked the beginning of fluidized bed application. Consider ,able work done during World War II by U.S. oil companies to improve the catalytic cracking of kerosene led to the development of the Fluid Catalytic Cracking process. Fluidized bed technology later exp...
In his book “Mathematical Mind-Benders”, Peter Winkler poses the following open problem, originally due to the first author: “[In the game Peer Pressure,] two players are dealt some number of cards, initially face up, each card carrying a different integer. In each round, the players simultaneously play a card; the higher card is discarded and the lower card passed to the other player. The play...
Deformation of the silo wall due to the single ball impact is modeled in ANSYS. The material in silo, as a Winkler bed, is replaced by spring-damper elements and the spring stiffness and damper coefficients are evaluated of the granular material and wall properties. The granular material deformation under the specified force is measured to evaluate the granular stiffness to be used for determin...
Th,e poper describcs our approach to o.cld.ing "stored procedure" capab'ility to a semantic database systerrt using Jaua byte-codes and, Jaro's abililU to dgnamicalLy load and esecute Jaua cotle. Seueral steps were necessaru: f,rst we added a ,laua appl'ication pragranrmer in.terface to the d,atqbase system; then we createcl. a database scherna to hold, Jaua etecutable cod.e; then we constructe...
OBJECTIVES To develop and test an optimal ensemble configuration of two complementary probabilistic data matching techniques namely Fellegi-Sunter (FS) and Jaro-Wrinkler (JW) with the goal of improving record matching accuracy. METHODS Experiments and comparative analyses were carried out to compare matching performance amongst the ensemble configurations combining FS and JW against the two t...
Steganography has been practiced since ancient times. Many Linguistic Steganography (popularly known as Text based Steganography) algorithms have been proposed like Word Spacing, Substitution, Adjectives, Text Rotation, Mixed Case Font etc.. Information Hiding effectively means that the method/technique should be Robust, Secure and have good Embedding capacity. Measure of Similarity between cov...
Abstract—In this study, the static behavior of super elliptical Winkler plate is analyzed by applying the double side approach method. The lack of information about super elliptical Winkler plates is the motivation of this study and we use the double side approach method to solve this problem because of its superior ability on efficiently treating problems with complex boundary shape. The doubl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید