Showing 5,661 - 5,680 results of 7,669 for search '(functional OR function) tasks', query time: 0.24s Refine Results
  1. 5661

    Approximation of Time-Frequency Shift Equivariant Maps by Neural Networks by Dae Gwan Lee

    Published 2024-11-01
    “…We first establish a one-to-one correspondence between <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mi mathvariant="sans-serif">Λ</mi></semantics></math></inline-formula>-equivariant maps and certain phase-homogeneous functions and also provide a reconstruction formula that expresses <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mi mathvariant="sans-serif">Λ</mi></semantics></math></inline-formula>-equivariant maps in terms of these phase-homogeneous functions, leading to a deeper understanding of the class of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mi mathvariant="sans-serif">Λ</mi></semantics></math></inline-formula>-equivariant maps. …”
    Get full text
    Article
  2. 5662

    ON THE ORGANIZATION OF THE STRUCTURE OF INNOVATIVE DEVELOPMENTS MANAGEMENT WITHIN THE FRAMEWORK OF PROJECT-ORIENTED COMPANIES by Inna Lapkina, Mykola Malaksiano

    Published 2020-09-01
    “…The following results were obtained:  a model of the company's management structure has been proposed, within the framework of which the parallel functioning of several departments using common resources, but at the same time based on conceptually different approaches to organizing the management system, is implemented.  …”
    Get full text
    Article
  3. 5663

    Geoinformation monitoring of the educational risk in educational institutions of higher education by Aleksandr N. Kolesenkov, Dmitry S. Zhuravlyov

    Published 2017-09-01
    “…According to the results of the work, it is revealed that the use of geoinformation technologies increases the efficiency of management by the collection automation, processing and analysis of data on the implementation of educational programs.Modern geoinformation technologies provide the opportunity to create and integrate a system that has innovative analytical functionality, and implements new effective technologies, methods and algorithms in the tasks of monitoring the educational programs. …”
    Get full text
    Article
  4. 5664

    Assessing the Impact of a Virtual Reality Cognitive Intervention on Tennis Performance in Junior Tennis Players: Pilot Study by Joaquin A Anguera, Aleem Choudhry, Michael Seaman, Dominick Fedele

    Published 2025-02-01
    “… BackgroundThere is evidence that cognitive training interventions can positively impact executive functions, and that some studies have demonstrated that athletes typically exhibit greater accuracy and faster response times on select cognitive tasks. …”
    Get full text
    Article
  5. 5665

    RESULTS OF TREATMENT OF EDENTULOUS PATIENTS WITH DENTURES MADE OF «FTORAX» by V.M. Dvornyk, H.M. Kuz, O.B. Tumakova, O.S. Shemetov, V.S. Kuz

    Published 2020-03-01
    “…The chewing apparatus undergoes a number of functional and morphological changes. Therefore, the complete absence of teeth sets the dentist the task of restoring the functions of full chewing, the appearance of the patient, and speech. …”
    Get full text
    Article
  6. 5666

    Applicability of elite samples in solving the traveling salesman problem by Goldberg model by Valery G. Kobak, Irma S. Rudova

    Published 2016-06-01
    “…It is shown that the efficiency of the genetic algorithm depends directly on the number of ants in the generation, and on the number of algorithm iterations. Target function values are improved more than twofold after the introduction of the elitist strategy. …”
    Get full text
    Article
  7. 5667

    UAV Swarm Rounding Strategy Based on Deep Reinforcement Learning Goal Consistency with Multi-Head Soft Attention Algorithm by Zhaotian Wei, Ruixuan Wei

    Published 2024-12-01
    “…Firstly, in order to make the model closer to reality, the reward function when the target is at different positions and the target escape strategy are set, respectively. …”
    Get full text
    Article
  8. 5668

    Factor Graph-Based Online Bayesian Identification and Component Evaluation for Multivariate Autoregressive Exogenous Input Models by Tim N. Nisslbeck, Wouter M. Kouw

    Published 2025-06-01
    “…We derive message-update rules for (1) a custom factor node that represents the multivariate autoregressive likelihood function and (2) the matrix normal Wishart distribution over the parameters. …”
    Get full text
    Article
  9. 5669

    Analytical Design and Polyphase Implementation Technique for 2D Digital FIR Differentiators by Radu Matei, Doru Florin Chiper

    Published 2024-12-01
    “…This technique uses an approximation based on two methods: the Chebyshev series and the Fourier series, which, finally, lead to a trigonometric polynomial, which is a remarkably precise approximation of the transfer function of the ideal differentiator. The digital differentiator is applied to three test images, one greyscale image and two binary images, and simulation results show its performance in the processing task. …”
    Get full text
    Article
  10. 5670

    Evaluating the Performance of Public Private Sector Dialogue Council in Regulation and Deregulation by Ahmad Markaz Malmiri

    Published 2020-11-01
    “…The council has not taken any action to get into modifying rules and the fact that it has not got much success in the cases contributed in regulation and deregulationreveals that there are many obstacles in performing this task which is the topic of this article. The main question of the present text is that, what are the reasons for the Council's failure in not getting any achievements in the functions of purpose, modification, abolishing or setting rules? …”
    Get full text
    Article
  11. 5671

    How a Web-Based Course Facilitates Acquisition of English for Academic Purposes by Jin Chen, Safia Belkada, Toshio Okamoto

    Published 2004-05-01
    “…The attitude variable was used to address the degree of motivation towards a Web-based communication platform as well as the enforced interaction functions. Statistical analyses revealed no significant effect of treatment on either comprehension or general L2 development, but significant differences were found with respect to language interaction for task completion under different task treatments. …”
    Get full text
    Article
  12. 5672

    Development of Models and Methods for Automated Control of Heat Supply System with Optimization of Technical Means Structure by Serhii Babych, Viktoriia Kryvda, Kristina Zhanko, Viktor Zubak, Vladyslav Suvorov

    Published 2023-12-01
    “…Simulation models of the controlled object functioning in the presence of alternative energy flows with different costs have been developed. …”
    Get full text
    Article
  13. 5673

    «I am not a giant, I am just a Laplander». Cándido María Trigueros and his correspondance by María ANGULO EGEA

    Published 2012-02-01
    “…<p>When Aguilar Piñal commenced the arduous task of «rescuing» Cándido María Trigueros from oblivion, he drew people’s attention to a unique figure of the 18th century. …”
    Get full text
    Article
  14. 5674

    Real-time image matching for navigation system based on genetic algorithm by LENG Xue-fei1, LIU Jian-ye2, XIONG Zhi2

    Published 2008-01-01
    “…The calculation of matching search can be reduced and the accuracy of matching results can be improved by using the weighted Hausdorff distance as the fitness function of genetic algorithm. Simulation results show that, the proposed image matching algo- rithm combined with genetic algorithm and weighted Hausdorff distance can satisfy the real-time and accuracy demands of the scene aided navigation system.…”
    Get full text
    Article
  15. 5675

    Literature Review on Using Internet Protocol Security (IPsec) on network Connectivity by Twana Saeed Ali

    Published 2024-12-01
    “…IPsec, introduced by the Internet Engineering Task Force (IETF), is a common tunneling technology for Virtual Private Networks that enhances the security features of the network layer, allowing several segments of a private network to function as a single segment. …”
    Get full text
    Article
  16. 5676

    Numerical study of eddy current by Finite Element Method for cracks detection in structures by S. Harzallah, M. Chabaat, K. Chabane

    Published 2016-12-01
    “…This is accomplished by inverting eddy current probe impedance measurements which are recorded as a function of probe position. This approach has been used in the aircraft industry to control cracks. …”
    Get full text
    Article
  17. 5677

    « Culture for the million, or society as it may be » by Françoise Baillet

    Published 2010-06-01
    “…The purpose of this paper is to examine the role and function of the graphic arts in the Victorians’ familiarity with avant-garde theories. …”
    Get full text
    Article
  18. 5678

    Estimation Approaches for States of Charge and Health of Lithium-ion Battery by Yihuan LI, Kang LI, James YU

    Published 2021-10-01
    “…Accurate and real-time battery state estimation is an important function of battery management systems, and it provides critical information for ensuring safe and reliable operation of batteries. …”
    Get full text
    Article
  19. 5679

    Bureaucratic Rationalism and The Quiet (R)evolution by William Twining

    Published 1996-01-01
    “…Karl Llewellyn once observed that the function of the law teacher is not to let the true light shine; he was wise to content himself with that negative formulation. …”
    Get full text
    Article
  20. 5680

    Traveling Wave Solutions of the Conformable Fractional Klein–Gordon Equation With Power Law Nonlinearity by Zhoujin Cui, Tao Lu, Bo Chen

    Published 2024-01-01
    “…In order to accomplish this task, a classic and effective analysis method, namely, the extended tanh–coth method, was utilized. …”
    Get full text
    Article