Showing 301 - 320 results of 1,250 for search '"Windows"', query time: 0.05s Refine Results
  1. 301

    Wallander's Dark Geopolitics by Stougaard-Nielsen Jakob

    Published 2020-09-01
    “…A current fault line in the study of crime fiction as a transnational genre is to what extent crime novels offer readers genuine cosmopolitan windows onto other worlds and cultures or whether it simply is bound to reproduce trite imagologies and national stereotypes. …”
    Get full text
    Article
  2. 302

    The Effect of STEM-Based Biology Learning on Thinking Skills Student Criticism of Environmental Pollution Material by Wina Ardini, Wahidin, Samuel Agus Triyanto

    Published 2024-05-01
    “…The data analysis techniqueused was the independent t test with the help of the SPSS version 25 forWindows application with a significance level of 5%. …”
    Get full text
    Article
  3. 303

    Can Transthoracic Echocardiography Be Used to Predict Fluid Responsiveness in the Critically Ill Patient? A Systematic Review by Justin C. Mandeville, Claire L. Colebourn

    Published 2012-01-01
    “…Limitations of the technique relate to patient tolerance of the procedure, adequacy of acoustic windows, and operator skill. Conclusions. Transthoracic echocardiographic techniques accurately predict fluid responsiveness in critically ill patients. …”
    Get full text
    Article
  4. 304

    Tropical Fowl Mite, Ornithonyssus bursa (Berlese) (Acari: Macronyssidae) by Harold A. Denmark, Harvey L. Cromroy

    Published 2005-02-01
    “…After the birds abandon their nests, the mites move into the building through windows, doors, and vents and bite the occupants. …”
    Get full text
    Article
  5. 305

    Tropical Fowl Mite, Ornithonyssus bursa (Berlese) (Acari: Macronyssidae) by Harold A. Denmark, Harvey L. Cromroy

    Published 2005-02-01
    “…After the birds abandon their nests, the mites move into the building through windows, doors, and vents and bite the occupants. …”
    Get full text
    Article
  6. 306

    Bulky Vehicles Recycling. Part 2 - Recycling of Selected Vehicle Components by Anna Matuszewska, Piotr Wieczorek, Marlena Owczuk

    Published 2020-12-01
    “…The article describes the recycling methods for selected components (tires, windows, catalytic converters, polymer and metal materials, operating fluids), with an indication of the differences between heavy goods vehicles and passenger cars. …”
    Get full text
    Article
  7. 307

    Security considerations for smartphone devices by Almina Mušinbegović, Harun Alijagic, Amer Hrnjic, Ali Abd Almisreb

    Published 2024-12-01
    “…Different approaches were examined for Windows, Android and alike, as well as diving into the three security layers or areas of security. …”
    Get full text
    Article
  8. 308

    Multiobjective Location Routing Problem considering Uncertain Data after Disasters by Keliang Chang, Hong Zhou, Guijing Chen, Huiqin Chen

    Published 2017-01-01
    “…This paper proposes a nonlinear location routing problem with half-time windows and with three objectives. The affected points can be visited more than one time. …”
    Get full text
    Article
  9. 309

    The Perancangan Simulator Sinkronisasi Generator ke Jaringan Listrik Menggunakan Game Engine Unity by Benhur Nainggolan, Rizaldy Saputra Dharma Winata, Andi Ulfiana

    Published 2024-08-01
    “…Penelitian ini bertujuan untuk merancang simulator sinkronisasi generator ke jaringan listrik yang dapat berjalan di sistem operasi Windows 64 bit dan menyediakan media pembelajaran bagi mahasiswa di apabila praktikum luring tidak dapat dilaksanakan. …”
    Get full text
    Article
  10. 310

    An Adaptive Spectral Kurtosis Method Based on Optimal Filter by Yanli Yang, Ting Yu

    Published 2017-01-01
    “…The core steps of the proposed SK algorithm are to find maxima, add window around maxima, merge windows in the frequency domain, and then filter signals according to the merged window in the time domain. …”
    Get full text
    Article
  11. 311

    Des images qui dénoncent ? by Damien Darcis

    Published 2018-07-01
    “…On the other side, I will analyze images made by anonymous artists, in remote, less visible sites, on the walls, on the doors or on the windows of "squats" harboring migrants in particular. …”
    Get full text
    Article
  12. 312

    Pengaruh Konseling Kelompok Dengan Teknik Role Playing Untuk Mengurangi Kecenderungan Perilaku Bullying Di SMP Negeri 02 Singaraja by Desti Br. Pangaribuan, Luh Putu Sri Lestari

    Published 2023-07-01
    “…The data analysis method used is in the form of a t-test with the help of the SPSS for Windows version 26 program which is then compared using the effect size, this has the aim of knowing how much influence is generated from the implementation of role playing technique group counseling services to reduce bullying behavior. …”
    Get full text
    Article
  13. 313

    Adaptive Heterogeneous Autoregressive Models of Realized Volatility Based on a Genetic Algorithm by Hui Qu, Ping Ji

    Published 2014-01-01
    “…Using four common loss functions, we find that the AHAR models outperform the corresponding HAR models in most of the forecast windows and thus are reasonable choices for volatility forecasting practices.…”
    Get full text
    Article
  14. 314

    Implementation Of The Use Of The C Programming Language in The Ubuntu Linux Operating System by Samsuriah Agus

    Published 2024-06-01
    “…This research focuses on implementing the C programming language within the Ubuntu Linux environment to validate its performance compared to its usage on Windows operating systems. The compilation and execution processes differ significantly on Ubuntu Linux, necessitating a distinct approach. …”
    Get full text
    Article
  15. 315

    Search for the Charmed Baryonium and Dibaryon Structures via the QCD Sum Rules by Xiu-Wu Wang, Zhi-Gang Wang

    Published 2022-01-01
    “…Except the current 1+ of ΣcΣc, we find the Borel windows for the other seven. There are two possible ΣcΣ¯c molecular states or compact six-quark states with the JP=1− and 0−. …”
    Get full text
    Article
  16. 316

    Waypoint Position Optimization for Accurate Ground-Based Arrival Time Control of Aircraft by Noboru Takeichi

    Published 2018-01-01
    “…The models of flight time uncertainty and the arrival time control window were developed using the actual track and numerical weather forecast data. …”
    Get full text
    Article
  17. 317

    Neural quantum propagators for driven-dissipative quantum dynamics by Jiaji Zhang, Carlos L. Benavides-Riveros, Lipeng Chen

    Published 2025-01-01
    “…NQP can handle arbitrary initial quantum states, adapt to various external fields, and simulate long-time dynamics, even when trained on far shorter time windows. Furthermore, by appropriately configuring the external fields, our trained NQP can be transferred to systems governed by different Hamiltonians. …”
    Get full text
    Article
  18. 318

    Machine Learning ECG Classification Using Wavelet Scattering of Feature Extraction by Heyam A. Marzog, Haider. J. Abd

    Published 2022-01-01
    “…As a result, each of the scattering paths has 16-time windows. Beat classification performance is classified by utilizing the MIT-BIH arrhythmia dataset. …”
    Get full text
    Article
  19. 319

    Access and Utilization of Agricultural Information by Horticultural Farmers in Raoda Village, North Kolaka Regency by Muhammad Idrus, Ismail Akhmad

    Published 2025-01-01
    “…Qualitative data is analyzed through data reduction, presentation, and verification, while quantitative data is analyzed using cross-tabulation and frequency tables with Microsoft Excel 2010 and SPSS for Windows 20.1. The study’s results indicate a relationship between the level of information access and its utilization. …”
    Get full text
    Article
  20. 320

    Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes by Gang-Cheng Huang, Ko-Chin Chang, Tai-Hung Lai

    Published 2025-01-01
    “…The Meterpreter framework for Microsoft Windows 32-bit and 64-bit architectures was used to produce the shellcode used in this investigation. …”
    Get full text
    Article