• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,752
Next 10 →

the Ultimate Solution?

by Zp F, Richard P. Stahura
"... We are rapidly approaching the time when zero carryback will be demanded by the environmentalists and OSHA. The carryback in reference is the fines that cling to the conveyor belt after the belt's cargo has been discharged over the head pulley. Having resisted the centrifugal force to be thrown ..."
Abstract - Add to MetaCart
We are rapidly approaching the time when zero carryback will be demanded by the environmentalists and OSHA. The carryback in reference is the fines that cling to the conveyor belt after the belt's cargo has been discharged over the head pulley. Having resisted the centrifugal force to be thrown off with the cargo, these fines are sticky enough to remain on the belt. As the belt returns to the tail pulley, the idlers that support the belt and the pulleys that bend the belt, dislodge this carried back material, causing it to fall and collect in piles and the very fine particles to become airborne. Recently I visited a plant that had a 42" wide conveyor belt carrying lignite from storage into the plant. An engineer was assigned to make a study determining if the fugitive material that was creating the "DURT" " problem was coming from the belt, and if it was, what to do about it. He was undecided if it was fugitive because of carryback or because of wind effect as the wind swept across the conveyor. If indeed the problem was from wind effect, a gallery would have to be built to enclose the conveyor. Assisting in this investigation, 1 placed a carryback gauge against the bottom of the return strand of the conveyor belt near the head pulley. This gauge is a measuring device with blades that will scrape a one inch wide area when pressed against the moving belt. Any particles clinging to the belt are scraped off and collected in the container of the device. The carryback gauge was placed against the belt at three different locations across the width of the belt; in the center and 10 inches left and right of center. The removed carryback material was measured. It was found to be an average of.08 ounces in a 10 second period. The belt was traveling at 592 feet per minute.

Noise filtering: the ultimate solution?

by Yuri Kalambet , Sergey Maltsev
"... Briefs A noise filtering method that provides the lowest possible confidence interval for every data point. Abstract A method of noise filtering based on confidence interval evaluation is described. In the case of the approximation of a function, measured with error by a polynomial or other functio ..."
Abstract - Add to MetaCart
Briefs A noise filtering method that provides the lowest possible confidence interval for every data point. Abstract A method of noise filtering based on confidence interval evaluation is described. In the case of the approximation of a function, measured with error by a polynomial or other functions that allow estimation of the confidence interval, a minimal confidence interval is used as a criterion for the selection of the proper parameters of the approximating function. In the case of the polynomial approximation optimized parameters include the degree of the polynomial, the number of points (window) used for the approximation, and the position of the window center with respect to the approximated point. The Method is demonstrated using generated and measured chromatograms. The special considerations on confidence interval evaluation and quality of polynomial fit using noise properties of the 2 data array are discussed. The Method provides the lowest possible confidence interval for every data point.

Additional Notes to \Ultimate Solution to Authentication via

by Taekyoung Kwon , 2000
"... This short letter adds informative discussions to our previous contribution, \Ultimate Solution to Authentication via Memorable Password"[1]. 1 ..."
Abstract - Add to MetaCart
This short letter adds informative discussions to our previous contribution, \Ultimate Solution to Authentication via Memorable Password"[1]. 1

The Ultimate Solution to the Quantum Battle of the Sexes game

by unknown authors , 906
"... Abstract. We present the unique solution to the Quantum Battle of the Sexes game. We show the best result which can be reached when the game is played according to Marinatto and Weber’s scheme. The result which we put forward does not surrender the criticism of previous works on the same topic. PACS ..."
Abstract - Add to MetaCart
. PACS numbers: 03.67.-a, 02.50.LeThe Ultimate Solution to the Quantum Battle of the Sexes game 2 1.

Quantum Cryptography: The Ultimate Solution to Secure Data Transmission?

by Ioannis P. Antoniades, Amalia N. Miliou, Miltiades K. Hatalis
"... Abstract. Quantum Cryptography is assumed as a next generation cryptographic system that may replace the public key protocol. The advantage of quantum cryptography over traditional key exchange methods is that the exchange of information can be shown to be secure in a very strong sense, without maki ..."
Abstract - Add to MetaCart
. The question is: could Quantum Cryptography be the ultimate solution to secure data transmission? This paper presents some recent developments in the field and investigates the guarantees offered by the proposed protocols. 1

Ultimate solution to authentication via memorable password

by Taekyoung Kwon
"... A new password authentication and key agreement protocol called AMP is proposed in a provable manner. Human-memorable password authentication is not easy to provide over insecure networks due to the low entropy of the password. A cryptographic protocol, based on the public-key cryptography, is the m ..."
Abstract - Cited by 9 (2 self) - Add to MetaCart
rigorous comparison to the related protocols. The protocols described in this contribution are from the papers, Ultimate Solution to

Big Data: An Ultimate Solution in Health Care

by Kiran Baby, Aswathy Ravikumar
"... Digital healthcare promises for better, efficient and cost effective solutions to existing health problems. The huge amount of data produced per hospital every year is increasing at an alarming rate, and there is a requirement for data to be preserved for decades for future references and study purp ..."
Abstract - Add to MetaCart
Digital healthcare promises for better, efficient and cost effective solutions to existing health problems. The huge amount of data produced per hospital every year is increasing at an alarming rate, and there is a requirement for data to be preserved for decades for future references and study

Ontology Matching: An Ultimate Solution for Semantic Interoperability in Healthcare

by Olaronke Iroju, Abimbola Soriyan, Ishaya Gambo
"... The healthcare domain is a complex domain which lacks a unified terminological set, most especially in clinical cases. As a result of this, the messaging standards employed in the healthcare domain use different terms for the same concept which often results in clinical misinterpretation, knowledge ..."
Abstract - Add to MetaCart
of achetype. However, these solutions have proved unsuccessful in resolving semantic heterogeneity in healthcare. Ontologies have also been developed to resolve this problem by making explicit the meaning of terms used in healthcare. Ontologies provide a source of shared and precisely defined terms, resulting

HADOOP the Ultimate Solution for BIG DATA Problems

by Papineni Rajesh, Y. Madhavi Latha
"... Abstract — The demand for analysing the data has augmented drastically. Big data is large amount of information present in the digital world around us. The data present in various formats is made accessible and when managing and storing this data and retrieval of data ought to be dynamic and prompt. ..."
Abstract - Add to MetaCart
Abstract — The demand for analysing the data has augmented drastically. Big data is large amount of information present in the digital world around us. The data present in various formats is made accessible and when managing and storing this data and retrieval of data ought to be dynamic and prompt. Hadoop is the technology used for secure, huge amount of data. This paper provides an overview of Big Data Analysis and Hadoop technologies used. data consists of structured and unstructured data that can yield insights in solving business issues and improve customer relations. The next generation storage system is a big issue to today’s world. Storage system should support multiple protocols, scale out and up, support business process, security, and flexible architecture and leverage thin and high efficient technologies.

RNY Hypothesis............................................................................. 232 Sequencing of Genes-the Ultimate Solution to the Code............................................................232

by Syozo Osawa, Thomas H. Jukes, Kimitsuna Watanabe, Akira Muto
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 2,752
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University