نتایج جستجو برای: insure method
تعداد نتایج: 1632015 فیلتر نتایج به سال:
A novel method for calculation of the motion and radiation reaction for the two-body problem (body plus particle, the small parameter m/M being the ratio of the masses) is presented. In the background curvature given by the Schwarzschild geometry rippled by gravita-tional waves, the geodesic equations insure the presence of radiation reaction also for high velocities and strong field. The metho...
This paper presents a perfect foresight model of speculative attacks on emerging markets. Credit constrained governments are assumed to have two objectives: to accumulate liquid assets in order to self-insure against shocks to national consumption and to insure poorly regulated domestic ®nancial markets. This policy regime generates endogenous ®scal de®cits de®ned to include the growth of conti...
A new method is introduced for the synthesis for logical initializability of synchronous state machines. The goal is to synthesize a gate-level implementation that is initializable when simulated by a 3-valued (0,1,X) simulator. The method builds on an existing approach of Cheng and Agrawal, which uses constrained state assignment to translate functional initializability into logical initializa...
The most dominant used method for protecting the bottom of a tank is impressing current cathodic protection (ICCP). Monitoring CP system critical to maintain and extend service life exterior storage tank. usually located on or near surface ground in contact with materials support so presents corrosion challenge. This work successful design an ionic conductor that can be as monitor procedure ICC...
Feature selection and description is a key factor in classification of Earth observation data. In this paper a classification method based on tensor decomposition is proposed. First, multiple features are extracted from raw LiDAR point cloud, and raster LiDAR images are derived by accumulating features or the “raw” data attributes. Then, the feature rasters of LiDAR data are stored as a tensor,...
To insure the confidentiality of data, it can be encrypted before it is transmitted. However, most data today is unencrypted. As a result, encrypted data might attract unwanted attention, simply due to the fact that it is encrypted. To avoid such attention, we propose a method of converting ciphertext into data that can pass certain automated tests for English text. Our goal is to foil automate...
The end-to-end communication problem is a protocol design problem, for sending a packet from a specified sourcenode s to a specified target-node t, through an unreliable asynchronous memoryless communication network. The protocol must insure reception and termination. In this paper, we measure the complexity of the protocol in term of header size, i.e., the quantity of information that must be ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید