نتایج جستجو برای: end sill step slope

تعداد نتایج: 700286  

2015
Soussan Djamasbi Siavash Mortazavi Mina Shojaeizadeh

Despite common belief, Baby Boomers form a sizable population of gamers. Paying attention to how this generation experiences a game can help companies that target this group of users increase their market share. To address this need, this study examines Baby Boomers’ reaction to a new way of manipulating objects in a game, namely with their eyes. In particular, the study focuses on testing the ...

2016
Eugen Tarnow

A discontinuity, a rounded step function, is shown to exist in the fitted linear slope of the recall distributions as the recall shifts from the emptying of working memory (positive slope) to the second stage (negative slope). The discontinuity leads to a first estimate of the capacity of working memory at 4-4.5 items. Working memory accounts for the recency effect. The primacy effect comes fro...

2013
Charles Perin Frédéric Vernier

This article presents R2S2, a hybrid visualization technique as an intermediate step between Rank Chart and Slope Graph to better understand and analyze team evolutions during soccer championships. Currently used rank tables for soccer are relative (ranked-based) and do not convey the absolute difference between teams. R2S2 provides a way to visualize these differences using the Slope Graph tec...

Journal: :The Journal of experimental biology 2011
Manning J Sabatier Bao Ngoc To Jennifer Nicolini Arthur W English

Slope-related differences in hindlimb movements and activation of the soleus and tibialis anterior muscles were studied during treadmill locomotion in intact rats and in rats 4 and 10 weeks following transection and surgical repair of the sciatic nerve. In intact rats, the tibialis anterior and soleus muscles were activated reciprocally at all slopes, and the overall intensity of activity in ti...

2006
Wung-Hong Huang

We analyze the energy and angular momenta of the two-spin spiky string moving on the AdS3×S with NS-NS field. Due to the infinite boundary of the AdS spacetime the solution will extend to infinity and it appears the divergences. After adding the counter terms we then obtain the dispersion relation of the corresponding giant magnon and see how the background field produces the correction terms. ...

Journal: :IACR Cryptology ePrint Archive 2011
Mario Romsy

In [BKT11] Baba, Kotyada and Teja introduced the FACTOR problem over non-abelian groups as base of an ElGamal-like cryptosystem. They conjectured that there is no better method than the naive one to solve the FACTOR problem in a general group. Shortly afterwards Stanek published an extension of the baby-step giant-step algorithm disproving this conjecture [Sta11]. Since baby-step giant-step met...

2007
David Gurzick A. Ozok Barbara Morris

A survey was conducted on 210 Baby Boomers (Age mean = 51.4 Std. dev. 5.46) within the United States to determine their current use of online technology in social interactions, their preferences in these interactions, and the expectations they have of near-future online communication technologies. The findings highlight the importance of online communication in their lives and spotlight their w...

2017
Anneke Horstman Mengfan Li Iris Heidmann Mieke Weemen Baojian Chen Jose M. Muino Gerco C. Angenent Kim Boutilier

Anneke Horstman, Mengfan Li, Iris Heidmann, Mieke Weemen, Baojian Chen, Jose M. Muino, Gerco C. Angenent, and Kim Boutilier Wageningen University and Research, Bioscience, 6708 PB Wageningen, The Netherlands Wageningen University and Research, Laboratory of Molecular Biology, 6708 PB Wageningen, The Netherlands Enza Zaden Research and Development, 1602 DB Enkhuizen, The Netherlands Max Planck I...

2006
Nelia Mann Samuel E. Vázquez

We present a simple procedure to construct non-local conserved charges for classical open strings on coset spaces. This is done by including suitable reflection matrices on the classical transfer matrix. The reflection matrices must obey certain conditions for the charges to be conserved and in involution. We then study bosonic open strings on AdS5×S. We consider boundary conditions correspondi...

2010
Hassan Jameel Asghar Josef Pieprzyk Huaxiong Wang

We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giantstep algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید