• No results found

18 results with keyword: 'physical activity sedentary behaviour spectrum chronic obstructive pulmonary'

Innovative Design of CMOS 8 bit Comparator using conditional tracking for low area

Fig 3 shows circuit for knowing the greater then conditions for all the odd bit positions and output is designed for 0 when condition is satisfied and it has 10

Protected

N/A

5
0
0
2020
Physical activity and sedentary behaviour across the spectrum of chronic obstructive pulmonary disease

This thesis investigated: (i) objectively measured physical activity and sedentary time and the correlates of these behaviours for mild-moderate COPD patients and

Protected

N/A

313
0
0
2021
Construction and Selection of Single Sampling Quick Switching Variables System for given Control Limits Involving Minimum Sum of Risks

( “Selection of single sampling attributes plan for given acceptance quality level and limiting quality level involving minimum risks”, Communication is

Protected

N/A

12
0
0
2020
AN IMPROVED OBLCAE ALGORITHM TO ENHANCE LOW CONTRAST IMAGES

OBLCAE stands for (Overall Brightness and local contrast adaptive enhancement) algorithm based on HSV color space is projected for low illumination color image

Protected

N/A

6
0
0
2020
Influence of Chemical Reaction on Unsteady MHD Free Convective Flow Past a Vertical Plate with Uniform Heat and Mass Flux through Porous Medium

An attempt has been made to study unsteady MHD free convective flow combined with heat and mass transfer of electrically conducting, viscous incompressible fluid

Protected

N/A

8
0
0
2020
ENERGY HARVESTING FROM RF SIGNAL

Fig.2. Block diagram of Energy Harvesting System. The above figure is overall system of energy harvesting from RF Signal. The major blocks are RF Receiver Antenna, Energy

Protected

N/A

5
0
0
2021
Fusion of Statistic, Data Mining and Genetic Algorithm for feature selection in Intrusion Detection

In [13], the author has proposed a new hybrid feature selection method – a fusion of Correlation-based Feature Selection, Support Vector Machine and Genetic

Protected

N/A

7
0
0
2020
Development of pronunciation activities regarding American English vowel sounds and–ed ending sounds of verbs and adjectives for eighth grade students

This research paper provides information on the teaching and practicing of pronunciation in EFL [English as a Foreign Language] classrooms and proposes, as its main purpose,

Protected

N/A

197
0
0
2021
EFFECT OF CHEMICAL REACTION ON UNSTEADY MHD FREE CONVECTIVE FLOW PAST A SEMI-INFINITE VERTICAL POROUS PLATE WITH HEAT GENERATION

The objective of the present study is to investigate the effect of various parameters like chemical Reaction parameter, thermal Grashof number, mass Grashof number, magnetic

Protected

N/A

8
0
0
2022
POLY HYBRID CRYPTOGRAPHY

Abstract -- This research paper discusses the Poly Hybrid Cryptography which is the science of data encryption, a technology that provides for a safe, secure,

Protected

N/A

6
0
0
2020
Modeling And Analysis Of Series-Switch Five-Level Dual-Buck Full-Bridge Inverters For Grid-Tied Applications

During this state, the inductor current iL2 decreases linearly when the voltage of the utility grid is lower than

Protected

N/A

9
0
0
2021
ELECTRIC-TECHNICAL PRODUCTS

Electric motors and alternating current generators, capacity from 100 kVт up to 25 mWt, voltage 6 and 10 kV, including thermoreactive isolation, type «Монолит». Electric

Protected

N/A

34
0
0
2021
Triangle Area Method Based Multivariate Correlation Analysis to Detect Denial of Service Attack using Packet Marking Trace Back

Detection Mechanism include threshold based anomaly detector, their normal profiles are generated using purely legitimate network traffic records and it is.. used

Protected

N/A

8
0
0
2021
THE ELECTION KLEBUN BASED APPLICATION

The results of this study indicate that the application of electronic voting for the election Klebun can be integrated in every village TPS and uses MD5 security system

Protected

N/A

5
0
0
2020
Web usage mining: Review on preprocessing of web log file

In order to discover usage patterns from the available data, it is necessary to perform: Pre processing, Pattern Discovery, and Pattern Analysis.. Web servers record and

Protected

N/A

5
0
0
2021
Web usage mining: Review on preprocessing of web log file

In order to discover usage patterns from the available data, it is necessary to perform: Pre processing, Pattern Discovery, and Pattern Analysis.. Web servers record and

Protected

N/A

5
0
0
2020
Clustering methods for Big data analysis

This method forms clusters based on the density of data points in a region and continue growing a given cluster as long as the density (number of objects or data points)

Protected

N/A

7
0
0
2020
A Statistical Approach to Classify and Identify DDoS Attacks using UCLA Dataset

The proposed algorithm and packet classification algorithm will be efficient and suitable for classifying DDoS flooding and scanning attacks. of Network and Distributed

Protected

N/A

5
0
0
2020

Upload more documents and download any material studies right away!