Power Consumption of Continuous Whipping Machine
نویسندگان
چکیده
منابع مشابه
Power Consumption Minimization of Khormoj Compressor Station
Arguably, the natural gas transmission pipeline infrastructure in Iran represents one of the largest and most complex mechanical systems in the world. The optimization of large gas trunk lines known as IGAT results in reduced fuel consumption or higher capability and improves pipeline operation. In the current study, a single-objective optimization was conducted for Khormoj compressor station o...
متن کاملThe Electronic Whipping Boy
Seventy per cent of children aged five to seven and 50% of all children were viewing Batman at the height of its popularity. The average child spends nearly two hours every day viewing television after 6 p.m. Television for children is transmitted before 6 p.m. The B.B.C. and the I.T.A. acknowledge a responsibility for what goes out on the air before 9 p.m. because they recognise that children ...
متن کاملFlogging tired horses: Who wants whipping and who would walk away if whipping horses were withheld?
Recent studies have cast doubt on the effectiveness of whipping horses during races and this has led to questions concerning its continuing justification. Furthermore, it has been argued that whipping tired horses in racing is the most televised form of violence to animals. The present study used de-identified data from a recent independent Australian poll (n = 1,533) to characterise the 26% of...
متن کاملanalysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولContinuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users
Handheld devices today do not continuously verify the identity of the user while sensitive activities are performed. This enables attackers, who can either compromise the initial password or grab the device after login, full access to sensitive data and applications on the device. To mitigate this risk, we propose continuous user monitoring using a machine learning based approach comprising of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: KAGAKU KOGAKU RONBUNSHU
سال: 1991
ISSN: 0386-216X,1349-9203
DOI: 10.1252/kakoronbunshu.17.1225