نتایج جستجو برای: outlet bucket

تعداد نتایج: 17705  

2015
Mehul Kumar Dhaval Kumar A Patel Bhavesh P Patel Mehul Kumar A Patel

The Hydraulic excavator machines are heavy duty earth mover consisting of a boom, arm and bucket. It works on principle of hydraulic fluid with hydraulic cylinder and hydraulic motors. The Hydraulic excavator backhoe operation require coordinated movement of boom, arm and bucket to control the bucket tip position by following a desired trajectory and to use the excavator machines effectively in...

2008
C. Dimopoulou B. Franzke T. Katayama D. Möhl F. Nolden G. Schreiber M. Steck

Fast longitudinal stacking of RIBs is foreseen in the NESR [1] in order to reach the high intensities required by internal experiments. The stacking is supported by electron cooling. Two schemes were investigated by dedicated beam dynamics simulations. The first uses a broadband Barrier Bucket (BB) rf system, the second makes use of multiple injections on the unstable fixed point of a sinusoida...

Journal: :Comput. J. 1987
Yannis Manolopoulos Dimitris Kleftouris Loukas Petrou

A model for an index sequential file employing multiple overflow chains per bucket is developed. This model is used to analyse the effects of insertions and deletions on the cost of successful and unsuccessful search in terms of block accesses. Numerical results are obtained illustrating the performance. The performance is also compared with that of an ISAM file using only one overflow chain pe...

Journal: :IEICE Transactions 2008
Han Seok Kim Eun-Chan Park Seo Weon Heo

We propose a token-bucket based rate control algorithm that satisfies both maximum and minimum rate constraints with computational complexity of O(1). The proposed algorithm allocates the remaining bandwidth in a strict priority queuing manner to the flows with different priorities and in a weighted fair queuing manner to the flows within the same priority. key words: token bucket, rate control...

2014
Antonio J. Roa-Valverde

In this paper we introduce Word Bucket, a mobile app that applies gamification to the problem of learning a foreign second language (FSL). Word Bucket consumes and produces linguistic data through user interaction, which can be used to improve available datasets relying on the power of the crowd. We describe the problems around handling “live” linguistic data and how semantic technologies can h...

2007
Bogdan S. Chlebus Dariusz R. Kowalski Mariusz A. Rokicki

We investigate deterministic broadcasting on multiple-access channels in the framework of adversarial queuing. A protocol is stable when the number of packets stays bounded, and it is fair when each packet is eventually broadcast. We address the question if stability and fairness can be achieved against the maximum injection rate of one packet per round. We study three natural classes of protoc...

Journal: :IBM Journal of Research and Development 1973
Jan A. van der Pool

A file of fixed-length records in auxiliary storage using a key-to-address transformation to assign records to addresses is considered. The file is assumed to be in steady state, that is that the rates of additions to and of deletions from the file are equal. The loading factors that minimize file maintenance costs in terms of storage space and additional accesses are computed for different buc...

2017
Ruiyu Zhu Yan Huang

LEGO-style cut-and-choose is known for its asymptotic efficiency in realizing actively-secure computations. The dominant cost of LEGO protocols is due to wire-soldering — the key technique enabling to put independently generated garbled gates together in a bucket to realize a logical gate. Existing wire-soldering constructions rely on homomorphic commitments and their security requires the majo...

2015
Jae Hwi Han Jae Gwang Song Jae Ho Kwon Kyung Woon Kang Daviesh Shah Kyung-Wook Nha

Bucket-handle tears less frequently occur in the lateral meniscus than in the medial meniscus. An 11-year-old male patient complained of painful swelling and locking due to a displaced bucket-handle tear of the lateral meniscus. We recommended an arthroscopic surgery; however, the patient left the hospital without surgical treatment. Six weeks afterwards, he returned without any complain of pai...

Journal: :IACR Cryptology ePrint Archive 2017
Ruiyu Zhu Yan Huang

LEGO-style cut-and-choose is known for its asymptotic efficiency in realizing actively-secure computations. The dominant cost of LEGO protocols is due to wire-soldering — the key technique enabling to put independently generated garbled gates together in a bucket to realize a logical gate. Existing wire-soldering constructions rely on homomorphic commitments and their security requires the majo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید