A FRAM-TYPE REINFORCING PROCEDURE USING GEOGRIDS
نویسندگان
چکیده
منابع مشابه
Assessment of the relative reinforcing strength of cocaine in socially housed monkeys using a choice procedure.
Position in the social hierarchy can influence brain dopamine function and cocaine reinforcement in nonhuman primates during early cocaine exposure. With prolonged exposure, however, initial differences in rates of cocaine self-administration between dominant and subordinate monkeys dissipate. The present studies used a choice procedure to assess the relative reinforcing strength of cocaine in ...
متن کامل2. Plutonium Isotopic Analysis Using Pc/fram
A. Purpose of This Chapter It has been 20 years since Chapter 8, “Plutonium Isotopic Composition by Gamma-Ray Spectroscopy” in the Passive Nondestructive Assay of Nuclear Materials (Sampson 91) book was first drafted in 1983. This book, commonly referred to as the “PANDA Manual,” is one of the principal resources for passive Nondestructive Assay (NDA) measurements throughout the worldwide nucle...
متن کاملA Tone Recognition Fram Mandarin
In this paper, we present a tone recognition framework for continuous Mandarin speech. To model the variations of F0 pattern caused by co-articulation and phonetic effects, a set of discriminating features are extracted: 1) outlined features from the F0 contours of target syllable and neighboring syllables are combined; 2) contextual tone information is utilized within an iterative process; 3) ...
متن کاملReinforcing Recommendation Using Implicit Negative Feedback
Recommender systems have explored a range of implicit feedback approaches to capture users’ current interests and preferences without intervention of users’ work. However, the problem of implicit feedback elicit negative feedback, because users mainly target information they want. Therefore, there have been few studies to test how effective negative implicit feedback is to personalize informati...
متن کاملReinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted access permission to all resources assigned to the user that they claim to be. However, numerous studies have shown that most security breaches are done by unauthorized users impersonating as authorized users (e.g. by ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of geotextile symposium
سال: 1993
ISSN: 0913-7882
DOI: 10.5030/jcigsjournal1986.8.84