A FRAM-TYPE REINFORCING PROCEDURE USING GEOGRIDS

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment of the relative reinforcing strength of cocaine in socially housed monkeys using a choice procedure.

Position in the social hierarchy can influence brain dopamine function and cocaine reinforcement in nonhuman primates during early cocaine exposure. With prolonged exposure, however, initial differences in rates of cocaine self-administration between dominant and subordinate monkeys dissipate. The present studies used a choice procedure to assess the relative reinforcing strength of cocaine in ...

متن کامل

2. Plutonium Isotopic Analysis Using Pc/fram

A. Purpose of This Chapter It has been 20 years since Chapter 8, “Plutonium Isotopic Composition by Gamma-Ray Spectroscopy” in the Passive Nondestructive Assay of Nuclear Materials (Sampson 91) book was first drafted in 1983. This book, commonly referred to as the “PANDA Manual,” is one of the principal resources for passive Nondestructive Assay (NDA) measurements throughout the worldwide nucle...

متن کامل

A Tone Recognition Fram Mandarin

In this paper, we present a tone recognition framework for continuous Mandarin speech. To model the variations of F0 pattern caused by co-articulation and phonetic effects, a set of discriminating features are extracted: 1) outlined features from the F0 contours of target syllable and neighboring syllables are combined; 2) contextual tone information is utilized within an iterative process; 3) ...

متن کامل

Reinforcing Recommendation Using Implicit Negative Feedback

Recommender systems have explored a range of implicit feedback approaches to capture users’ current interests and preferences without intervention of users’ work. However, the problem of implicit feedback elicit negative feedback, because users mainly target information they want. Therefore, there have been few studies to test how effective negative implicit feedback is to personalize informati...

متن کامل

Reinforcing Access Control Using Fuzzy Relation Equations

Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted access permission to all resources assigned to the user that they claim to be. However, numerous studies have shown that most security breaches are done by unauthorized users impersonating as authorized users (e.g. by ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of geotextile symposium

سال: 1993

ISSN: 0913-7882

DOI: 10.5030/jcigsjournal1986.8.84