This means that banks will breach the buffer requirements before they breach the Pillar 2 and the minimum requirements.20 The consequences of breaching buffer requirements are also intended to be milder than the
Thresholds \(M_i,\; i=1,2\) depend on the initial water stock and the other parameters of the problem. $$\begin{aligned} M_1=M_1(S_0;S_{max},\alpha ,\beta ,\phi ,k,\rho ,c_0,c_1); \quad M_1=M_2(S_0;\alpha ,\beta ). \end{aligned}$$...
The voltage thresholds ranged from 3.6 to 4.2 V since the author selected to use gradually decreasing voltage increments between each stage. The finding revealed that using a five- and ten-stage voltage threshold-based technique reduced the charging time while the lifetime was unaffected [21,29]...
Another type of standard uses injury thresholds to ensure a minimum level of protection, such as the U.S. Federal Motor Vehicle Safety Standards and the U.S. Army ground vehicle blast protection criteria. This dissertation uses these standards to examine the impact of safety optimization ...
T cell priming by dendritic cells: thresholds for proliferation, differentiation and death and intraclonal functional diversification. Eur J Immunol. 2002;32(7):2046–54. doi: 10.1002/1521-4141(200207)32:7<2046::AID-IMMU2046>3.0.CO;2-M. Article CAS PubMed Google Scholar Hofmann M, Radsak...
Notably, significant improvements for MBE and RT were initiated at comparable dosage thresholds, around 390 METs-min/week for MBE and 380 METs-min/week for RT, indicates a parallel level of efficiency at these initial doses. This suggests that both modalities begin to exert Scientific Reports |...
In both cases, NPIs are triggered after the peak of the outbreak, where hospitals might have already been oper- ating at their surge capacities for a few weeks. Both cases start at states falling on the control thresholds recommended in Figures 2(c) and 2(d)[37]. This finding indicates ...
Supervised learning techniques are used when formulating the problem as a classification problem, e.g., enforcing specific thresholds to select appropriate power controls or as regression, for predicting upcoming transmissions, using LSTM. Unsupervised learning is used a first step in hierarchical ...
It requires tuning of thresholds and the size of the filtered subset. Thus the NDC filter is implemented, which selects a single contingency or a group as a minimal subset containing for each constraint a contingency that leads to the largest violation filtering out the dominated contingencies. ...
In some embodiments, an exponential function is used for W. This reflects the fact that computer systems experiencing temperatures higher than critical thresholds experience more severe stress (and potentially immediate damage). For example, the function used for computing the Win the following sections...