Essen

(redirected from ESST)
Also found in: Dictionary, Acronyms, Encyclopedia, Wikipedia.
Related to ESST: Essential oils, Eset, ESSET, Esat
Graphic Thesaurus  🔍
Display ON
Animation ON
Legend
Synonym
Antonym
Related
  • noun

Words related to Essen

a city in western Germany

References in periodicals archive ?
Differences between SMs with and without LLL were found in all four of the CHAMP items: SLS, ESST, T-Test, and IAT.
The ESST was time limited and scored based on the number of 1 m spans crossed within the allotted 10 s time period, with greater distance indicating better performance.
For the ESST, T-Test, and IAT, the 0 designated scores lower than the range recorded in this study.
The ESST and IAT scores differed significantly between the TTA and TFA groups (p < 0.
For example, in order to change directions quickly in the frontal plane when performing the ESST or in the sagittal plane when pivoting such as in the IAT, it is necessary to be able to flex the knee joint and eccentrically contract the quadriceps femoris and gluteus maximus in order to produce a powerful concentric contraction leading to a fast explosive movement.
Although the ESST, T-Test, and IAT have been described in the literature, discrepancies do exist with regard to the test layout, administration, and scoring, suggesting a need to establish a standardized means of testing that is also proven to be reliable.
The primary purpose of this study was to establish the interrater and test-retest reliability of the ESST, T-Test, and IAT in a nondisabled population of male Active Duty (AD) U.
In October, ESST reported net revenues for the third quarter of 2003 of $48.
Company: ESS Technology, Inc Ticker Symbol & Stock Exchange: ESST Date Presenting: Monday, November 3rd and Tuesday, November 4th Investor Relations Contact: Rebecca Mack Phone: 949-981-4496 E-mail: IR@esstech.
The ESSTs are vulnerability commandos; they perform covert and overt Tempest, COMSEC and COMPUSEC attacks on the base's computer and communications systems.
The ESSTs generally deal with the least complex - but most common - security problems, which are generally caused by ignorance of basic security issues and improper procedures.