Found 14,582 results in section Other VSB-TUO websites on query Cheap fc 26 coins Buyfc26coins.com I used a simple ordering process..VzYT
http://tces.vsb.cz/Home/ArticleDetail/676
concrete structural systems, formed by various slender members (i.e. columns, piers, frame legs, etc.), are used more frequent than ever. Effects of external forces
http://tces.vsb.cz/Home/ArticleDetail/531
which are specified by means of wind rose. The FFT analysis is applied to wind direction, intensity and temperature too. Spectrum of velocity and temperature were used
http://tces.vsb.cz/Home/ArticleDetail/474
the large amounts of processed concrete used. Construction of the base layers beneath concrete floors using the materials prescribed by project documentation therefore
http://tces.vsb.cz/Home/ArticleDetail/808
eighties of the last century was the method of open stope with mining railles mechanization. For selective mining since the nineties was used new method of extraction:
https://advances.vsb.cz/index.php/AEEE/article/view/2407
depth. Two most used compression standards H.264 and H.265 were evaluated with 1, 3, 5, 10 and 15 Mbps bitrate in Full HD and UHD resolution. Finally, the perceived
https://advances.vsb.cz/index.php/AEEE/article/view/11
frequently used service is an answering machine. Asterisk offers this feature, of course, and we created a tool that offers users the administration machine, plus
https://advances.vsb.cz/index.php/AEEE/article/view/5745
method. An adaptive tuning method based on the machine model is used to estimate the stator resistance to enhance the accuracy of the rotor flux angle in the FOC
https://advances.vsb.cz/index.php/AEEE/article/view/620
to research relating to the defect light emission and correlation with rectangular microplasma fluctuation. A sensitive CCD camera has been used for mapping of surface
https://advances.vsb.cz/index.php/AEEE/article/view/25
regulator as a function block which can be also used for extension control functions. Control systems for relay and moment self tuner with visualizations in WinCC
https://advances.vsb.cz/index.php/AEEE/article/view/1707
parameter estimation technique is adopted where only one set of in-situ measured load test data is used. Conventional methods viz., EMF, MMF, Potier triangle method
https://advances.vsb.cz/index.php/AEEE/article/view/2377
provided by Kinect sensors are used to enhance the accuracy of human detection. The depth-based human detection method is fast but less accurate. On the other hand,
https://advances.vsb.cz/index.php/AEEE/article/view/4370
tracking problem. The path tracking problem is mainly caused by external environmental disturbances and the unknown uncertainties of the URV model. The ANLPID controller is used
https://advances.vsb.cz/index.php/AEEE/article/view/2196
signal extraction, namely: the Independent Component Analysis (ICA) and the Principal Component Analysis (PCA) Methods. We used the fetal heart rate extracted from
https://advances.vsb.cz/index.php/AEEE/article/view/240412
surges. The grounding grid configurations and mathematical modeling are explained. Many configurations are used in the analysis such as one, four, sixteen meshes
https://advances.vsb.cz/index.php/AEEE/article/view/1497
server sides. Our new tool implements features, which allow the user to perform tests with variable packet size and traffic rate. All these features can be used
https://advances.vsb.cz/index.php/AEEE/article/view/1200
method is used for the process. K-Means is one of the most successful clustering methods. In our study we customized the algorithm to get the best result and tested
https://advances.vsb.cz/index.php/AEEE/article/view/1201
interruption in data stream. The digital subscriber line may be used for the implementation of the inverse multiplex. Accurate knowledge of the transmission parameters
https://advances.vsb.cz/index.php/AEEE/article/view/1203
computes VoIP quality metrics, and adds these metrics into extended IPFIX flow records. Then, these extended data are stored in a central IPFIX monitoring system called collector where can be
https://advances.vsb.cz/index.php/AEEE/article/view/2973
induction motor parameters. An approximation based on the definition of the Laplace transformation is used to obtain initial values of the parameters. These values
https://advances.vsb.cz/index.php/AEEE/article/view/546
attacks and it compiles evaluation of its overall security on the basis of successfully or unsuccessfully penetrations. The article describes the applications and algorithms that are used