Search alternatives:
errors » error (Expand Search)
Showing 1,261 - 1,280 results of 14,501 for search 'research errors', query time: 0.16s Refine Results
  1. 1261
  2. 1262

    Modeling the effect of building information modeling (BIM) in reducing rework in construction projects using structural equations method by malihe zoghi, ohamad jafar fesharaki, mehrdad Hemasian ettefagh

    Published 2024-03-01
    “…The use of the structural equation research method to influence the relationship between variables in this research showed that identifying errors and recording them at the right time and place can lead to a reduction in rework in project implementation. …”
    Get full text
    Article
  3. 1263

    The Gamma Distribution and Inventory Control: Disruptive Lead Times Under Conventional and Nonclassical Conditions by John E. Tyworth

    Published 2025-05-01
    “…<i>Background</i>: Foundational research on the gamma distribution and inventory control highlighted its flexibility and practicality for managing fast-moving finished goods. …”
    Get full text
    Article
  4. 1264

    Differential fault analysis on EMV application cryptogram by Qian PENG, Zeng-ju LI, Ru-hui SHI

    Published 2016-04-01
    “…The process of application cryptogram in EMV was researched and dummy bits in session key were found.Based on the session key’s dummy bits and compressive property of DES’s Sbox,much information of the application cryptogram master key was got by using safe-error attack.The differential fault attack model and steps to implement the attack were proposed,two key factors(the probability of generating wrong key and the probability of collision happening) affecting an attacking result were analyzed.The theoretical result and simulation of the attack were given.The experiment results show that the two keys could be distinguished in a real attacking when the dif-ference of two key’s collision probability was bigger than 0.003 5.The dummy bits in the key will increase the dif-ference and make distinguishing easier.Finally,several countermeasures against the attack were proposed.…”
    Get full text
    Article
  5. 1265
  6. 1266
  7. 1267
  8. 1268
  9. 1269
  10. 1270
  11. 1271
  12. 1272
  13. 1273
  14. 1274

    Application of improved and efficient image repair algorithm in rock damage experimental research by Mingzhe Xu, Xianyin Qi, Diandong Geng

    Published 2024-06-01
    “…Digital image technology is vulnerable to interference from fractures and scaling, leading to potential loss of image data; while acoustic emission technology is not hindered by these issues, noise from rock destruction can interfere with the electrical signals, causing errors. The monitoring errors of these techniques can undermine the effectiveness of rock damage analysis. …”
    Get full text
    Article
  15. 1275
  16. 1276
  17. 1277

    Research on coordinated control of support system of magnetoelectric hybrid suspension belt conveyor by Kun HU, Hao JIANG, Zhuo CHEN, Jie NIU, Gang XU

    Published 2025-02-01
    “…The system’s dynamic performance under static suspension and disturbances from air gaps and material loading is validated by experimental research using a suspension experimental rig. The experimental results demonstrate maximum air gap fluctuations and coordination errors of 1 mm under the respective conditions. …”
    Get full text
    Article
  18. 1278
  19. 1279
  20. 1280

    Research on reinforced concrete structure design of urban buildings by using BIM technology by Qianhong Bao

    Published 2024-12-01
    “…Methods: This paper takes the housing project in District A of Guangzhou as the research object, and uses BIM technology to design the precast part of the reinforced concrete structure in the C household, including the deepening design of the reinforced concrete structure, production management of the precast components, tracking, address data modeling, hoisting and deployment, etc., which penetrates into all aspects of the design of the reinforced concrete structure. …”
    Get full text
    Article