Results 91 to 100 of about 1,832,166 (299)
High-level Cryptographic Abstractions
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while ...
Chand, Saksham +4 more
core +1 more source
Thermomechanical fatigue tests of laser beam powder bed fusion (PBF‐LB) Inconel 718 show that the additively manufactured material reaches almost the lifetimes of conventionally‐rolled material under no‐dwell conditions. Introducing dwell times at the maximum temperature markedly reduces the lifetimes due to pronounced grain boundary sliding associated
Stefan Guth +6 more
wiley +1 more source
Objectives: This study aimed to provide an improved energy expenditure estimation for heavy-load physical labor using accelerometer data and heart rate (HR) measured by wearables and to support food preparation and supply management for disaster relief ...
Hitomi Ogata +6 more
doaj +1 more source
Efficiency increasing of training process on basic technique of wrestler's motor actions in free style at the initial stage with using of computer technologies [PDF]
Possibilities of use of computer technologies in a system of preparation of fighters on a pioneering stage are exhibited. 10 competent sportsmen, 20 trainers of the maximum grade participated in experiment, 10 fighters of a freestyle of the first grade ...
Tupeev Y.V., Boyko V.F.
doaj
Beam-beam observations in the RHIC
The Relativistic Heavy Ion Collider (RHIC) at Brookhaven National Laboratory has been in operation since 2000. Over the past decade, the luminosity in the polarized proton (p-p) operations has increased by more than one order of magnitude.
Fischer, W., Luo, Y.
core +1 more source
The maximum Σ-count as a decision operator
The main approaches in pattern classification can be grouped into two main categories: the statistical and the syntactic pattern classification. This paper presents another method based on fuzzy set theory. At first a brief overview of the statistical method is given and especially the maximum likelihood decision rule. Then the maximum \(\Sigma\)-count
openaire +2 more sources
On Maximum Likelihood Estimation of Operational Loss Distributions [PDF]
This paper develops a likelihood-based methodology to estimate loss distributions and compute Capital at Risk in risk management applications. In particular, we deal with the problem of estimating severity distributions with censored and truncated operational losses, for which numerical maximization of the likelihood function by means of standard ...
openaire +2 more sources
Cermets (60 vol.% AISI 316L stainless steel, 40 vol.% recycled MgO), intended for use in aluminum electrolysis, were pre‐oxidized in three furnaces with different heating technologies and subjected to a cryolite corrosion test. The different atmospheres influenced the formation of oxide layers, which in turn affected corrosion resistance and ...
Patricia Kaiser +4 more
wiley +1 more source
Microstructure Evolution of a VMnFeCoNi High‐Entropy Alloy After Synthesis, Swaging, and Annealing
The synthesis and processing (rotary swaging and annealing) of the novel VMnFeCoNi alloy is investigated, alongside the estimation of the grain size effect on hardness. Analysis of a wide grain size range of recrystallized microstructures (12–210 µm) reveals a low annealing twin density.
Aditya Srinivasan Tirunilai +6 more
wiley +1 more source
Global Linear Complexity Analysis of Filter Keystream Generators
An efficient algorithm for computing lower bounds on the global linear complexity of nonlinearly filtered PN-sequences is presented. The technique here developed is based exclusively on the realization of bit wise logic operations, which makes it ...
A. Fuster-Sabater +5 more
core +1 more source

