نتایج جستجو برای: load setting

تعداد نتایج: 396823  

Journal: : 2021

To study the effect of shock wave load on body elements vehicles, a setting has been developed that takes into account mobile nature this load. A specialized parametric finite-element model layout created armored-carrier, taking peculiarities studied process. The problem determining stress-strain state armored-hulls solved in static and dynamic formulation. space-time distributions components c...

Journal: :The journal of spinal cord medicine 2011
Eric Turner Harness Todd A Astorino

OBJECTIVE To examine acute energy costs of multi-modal activity-based therapy (ABT) in men and women with spinal cord injury (SCI). STUDY DESIGN Descriptive case series. SETTING An outpatient center in California. PARTICIPANTS Seven men and women (age = 28.3 ± 11.6 years; duration of injury = 4.3 ± 2.5 years) with injury levels ranging from C5 to T8. INTERVENTION Activity-based therapy....

Journal: :Transboundary and emerging diseases 2011
B Oidtmann G D Stentiford

We have reviewed the available peer reviewed literature on pathogen load for white spot syndrome virus (WSSV) in species susceptible to infection. Data on pathogen load in traded commodities are relevant for undertaking import risk assessments for a specific pathogen. Data were available for several of the major penaeid shrimp species farmed for aquaculture and for one crab and crayfish species...

2012
Ujjwal Neogi Soham Gupta Rashmi Rodridges Pravat Nalini Sahoo Shwetha D. Rao Bharat B. Rewari Suresh Shastri Ayesha De Costa Anita Shet

BACKGROUND & OBJECTIVES Monitoring of HIV-infected individuals on antiretroviral treatment (ART) ideally requires periodic viral load measurements to ascertain adequate response to treatment. While plasma viral load monitoring is widely available in high-income settings, it is rarely used in resource-limited regions because of high cost and need for sophisticated sample transport. Dried blood s...

Journal: :Journal of immunology 2004
Erwan R Piriou Karel van Dort Nening M Nanlohy Frank Miedema Marinus H van Oers Debbie van Baarle

In contrast to the situation in the post-transplant setting, in HIV-infected individuals an elevated EBV load is not predictive of EBV-related malignancies. To study whether a high EBV load is already a normal situation early in HIV infection and is not related to a decrease in immune function over time, we investigated EBV load and EBV-specific CD8(+) T cells approximately 1 year before and 1 ...

2000
J. Sun L. C. Zhang Y.-W. Mai S. Payor M. Hogg

The optical polishing of hydrophilic polymer materials is a complex process that requires a comprehensive setting of various operating parameters. Based on a series of experimental investigations and dimensional analysis, this paper presents a simple empirical equation to evaluate material removal in the polishing of optical spherical surfaces of hydrophilic polymer materials. It is shown that ...

2002
Miroslav Šimandl Ondřej Straka

A solution of the Bayesian recursive relations by the particle filter approach is treated. The stress is laid on the sample size setting as the main user design problem. The Cramér-Rao bound was chosen as a tool for setting the sample size for the three basic types of the state estimation, for filtering, prediction and smoothing. The mean square error matrices of particle filter state estimates...

1994
Baruch Awerbuch Yossi Azar

The work is motivated by deadlock resolution and resource allocation problems, occurring in distributed server-client architectures. We consider a very general setting which includes, as special cases, distributed band-width management in communication networks, as well as variations of classical problems in distributed computing and communication networking such as deadlock resolution and \din...

2012
Varsha Dani Valerie King Mahnush Movahedi Jared Saia

We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a large number of parties. We consider both the synchronous and the asynchronous communication models. In the synchronous setting, our protocol is secure against a static malicious adversary corrupting less than a 1/3 fraction of the parties. In the asynchronous setting, we allow the adversary to c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید