نتایج جستجو برای: response error software was designed 60 right

تعداد نتایج: 5260638  

The aim of this paper was to present an optimized method in order to use maximum capacity of the photovoltaic panels. In this regard, we presented a method for the maximum power point tracking in the photovoltaic systems by using the neural networks and adaptive controller. In the proposed system, we estimated an error by using neural network. If this error is lower than the allowable systems e...

Journal: :رشد و یادگیری حرکتی - ورزشی 0
زهره فرنقی کارشناس ارشد رفتار حرکتی دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)، دانشکدۀ تربیت بدنی و علوم ورزشی، اصفهان، ایران رخساره بادامی استادیار دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)، دانشکدۀ تربیت بدنی و علوم ورزشی، اصفهان، ایران مریم نزاکت الحسینی استادیار دانشگاه اصفهان، دانشکدۀ تربیت بدنی و علوم ورزشی، اصفهان، ایران.

the aim of this study was to evaluate the effect of handedness and two practice types (explicit vs. implicit) on motor sequence learning. 60 girls (age range of 14 – 17 years old) were randomly assigned to four groups according to their handedness: right–handed-explicit, right–handed–implicit, left–handed-explicit, and left–handed-implicit. participants’ task was accuracy and time of sequential...

Journal: :مدیریت اطلاعات سلامت 0
بنیامین محسنی ساروی کارشناس، مدارک پزشکی، دانشگاه علوم پزشکی مازندران، مازندران آذر کبیرزاده مربی، آموزش مدارک پزشکی، دانشگاه علوم پزشکی مازندران، ساری ابراهیم باقریان فرح آبادی مربی، آمار، دانشگاه آزاد اسلامی ساری، ساری عالیه زمانی کیاسری استادیار، بیهوشی، دانشگاه علوم پزشکی مازندران، ساری

normal 0 false false false en-us x-none ar-sa microsoftinternetexplorer4 introduction: death-related information is source for identifying the health prerequisites and formulating the related programs. due to importance of data for decision making, evaluation of it to determine the rate of documentation and errors is necessary. methods: in this descriptive, cross-sectional study, all issued cer...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2022

A previous study has been conducted integrating modification on secure hash algorithm 1 (SHA-1) to document integrity verification of printed documents using quick response (QR) codes. However, encryption is warranted as data transmitted in plaintext directly the server prevent hacking and ensuring not only but security well. more secured QR code was designed developed by successfully incorpora...

Journal: :journal of biomedical physics and engineering 0
m. a. younessi heravi m. a. khalilzadeh s. joharinia

background: one of the main problems especially in operating room and monitoring devices is measurement of blood pressure (bp) by sphygmomanometer cuff. objective: in this study we designed a new method to measure bp changes continuously for detecting information between cuff inflation times by using vital signals in monitoring devices. this will be achieved by extraction of the time difference...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1391

even though, to date, a lot of studies have been conducted on the subject of politeness theory, there are very few studies regarding the applicability of this theory to translation between english and persian which shows the reason behind conducting the present study. this study was carried out with the aim of highlighting whether there is any difference between english and persian methods of u...

1997
Luigi Rizzo

Forward Error Correction (FEC) is seldom used in computer networks, because of perplexity in doing the necessary encoding/decoding in software. We believe this diidence to originate from the fact that error control codes (which FEC is usually based upon) are generally designed and presented stressing their ability to correct errors rather than erasures (i.e. missing data in known locations). Ha...

Journal: :Remote Sensing 2023

EUMETSAT is currently developing the on-ground processing chain of infrared sounders (IRS) on-board Meteosat third-generation sounding satellites (MTG-S). In this context, authors investigated impact a particular type radiometric error, called hereafter calibration ringing. It arises in Fourier transform spectrometers when instrument’s transfer function (RTF) varies within domain spectral respo...

2009
Mariusz H. Jakubowski Chit Wei Saw Ramarathnam Venkatesan

Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produce a crash or gradual failure, rendering the application unusable or troublesome. Such a response is designed to complicate attacks, but has also caused problems for developers and end users, particularly when bugs or other prob...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید