Zobrazeno 1 - 10
of 135
pro vyhledávání: '"K loop"'
Autor:
Souza, Carlos Henrique R. ⁎, de Oliveira, Saulo S., Berretta, Luciana O., Carvalho, Sergio T.
Publikováno v:
In Entertainment Computing January 2025 52
Autor:
Lessard, Dominique V. ‡, Zinder, Oraya J. ‡, Hotta, Takashi §, Verhey, Kristen J. §, Ohi, Ryoma §, Berger, Christopher L. ‡, 1
Publikováno v:
In Journal of Biological Chemistry 19 April 2019 294(16):6353-6363
Publikováno v:
Applied Sciences, Vol 12, Iss 17, p 8583 (2022)
Service robotics involves the design of robots that work in a dynamic and very open environment, usually shared with people. In this scenario, it is very difficult for decision-making processes to be completely closed at design time, and it is necess
Externí odkaz:
https://doaj.org/article/020698e58ce14ea3901a128f1ef65f7d
Publikováno v:
In Journal of Algebra 1 March 2017 473:481-512
Publikováno v:
In Procedia Computer Science 2017 112:270-277
Autor:
Lee, Dae-Woong
Publikováno v:
Filomat, 2017 Jan 01. 31(7), 1875-1892.
Externí odkaz:
https://www.jstor.org/stable/26194925
Publikováno v:
Journal of Orthodontic Science, Vol 6, Iss 3, Pp 97-103 (2017)
Correction of class II molars in growing patients with acceptable facial profile can be performed by distalization of maxillary first molars. However, in patients where compliance is difficult intraoral means of molar distalization is required. This
Externí odkaz:
https://doaj.org/article/690bbf888d0f4ac8ab9c47b7675d79f7
Autor:
Pravinkumar S Marure, Raju Umaji Patil, Sumitra Reddy, Amit Prakash, Nillachandra Kshetrimayum, Rajeevkumar Shukla
Publikováno v:
Journal of Indian Society of Pedodontics and Preventive Dentistry, Vol 34, Iss 4, Pp 331-340 (2016)
Background: A common strategy to correct Class II malocclusions using a nonextraction protocol in children is to move the maxillary molars distally using molar distalization appliances, which usually derive their anchorage from maxillary premolars, c
Externí odkaz:
https://doaj.org/article/f880328e4617453ba6bad568de17712a
Internet of Things (IoT) devices have become ubiquitous in our everyday life, with security becoming an ever-growing issue as more and more cyber-attack incidents being reported, primarily due to deficiencies in existing security mechanisms. However,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3361::2a7f887f9b5fb5ae6b16d31e19461ed1
https://epub.jku.at/doi/10.1109/SEAMS59076.2023.00034
https://epub.jku.at/doi/10.1109/SEAMS59076.2023.00034
Autor:
Beneduci, Roberto a, Molnár, Lajos b, ⁎, 1
Publikováno v:
In Journal of Mathematical Analysis and Applications 1 December 2014 420(1):551-562