An algorithm is proposed, which provides an increase of the accuracy in smoothing coordinate information given anomalous measurements. The algorithm is based on the least-squares method that uses information on the first and second derivatives of the distance to a space object. Results of computations...
Ojala, A. and Tyrvainen, P. (2009) "Impact of psychic distance to the internationalization behavior of knowledge-intensive SMEs", European Business Review. Vol. 21 Iss: 3, pp.263 - 277.Ojala, A., Tyrvainen, P. (2009). Impact of psychic distance to the internationalization behaviour of...
Retorque the air valve fasteners (V) in a crisscross pattern to specified torque. graco.com 以十字形模式,将空气阀紧固件 (V) 重新拧紧 至指定扭力。 graco.com Low transport volumes and long distances typically add up to high freight and logistics costs and low frequency of services, in ...
Under Token Jumping ( T J extsf{TJ} ), the target vertex needs not to be adjacent to the original one. The Distance- d Independent Set Reconfiguration (D d ISR) problem under T S / T J extsf{TS}/extsf{TJ} asks if there is a corresponding sequence of adjacent D d ISs that ...
Chapter 4 The Switch to Distance Teaching and Learning in Finland During the COVID-19 Pandemic (2020–2022) Went Technically Well but Was Emotionally Challenging Katariina Salmela-Aro and Jari Lavonen Abstract In this chapter, we analyze and discuss teaching, learning and...
To understand the structural basis of the compound action, the crystal structure (2.54 Å) of human Top2 β-isoform (hTop2β) cleavage complexes stabilized by compound C-Bi was determined. However, compound C-Bi was not visible in the crystal structure. Through the comparison of the ...
article on garden plot Ⅰ back 110kV transmission line fault caused by the tripping of the analysis, we found the trip is due to the overhead ground wire and wire a safe distance from a safe distance from the special weather caused the request does not meet the regulations, and this iss...
The plans and activities of academic libraries revolve around a user-centered approach to make noticeable improvements in the use of library resources and services. The purpose of this study was to examine library support strategies for the effective utilization of library support services and resources...
The second section of SIS-AODV consists of Ant Colony Grey Wolf Optimization over the AODV algorithm to improve network performance while implementing a security algorithm over MANET. Analysis results show maximum performance with a packet delivery ratio of 98% and throughput of 85%. In addition, ...
adjudgement of upward mining feasibility in the seam group with a short distance to each other was established.The results showed that the higher of the mining influence coefficient,the longer the time interval between the up seam mining and the low seam mining would be favorable to the up ...