-
2541
Characterization of Riesz and Bessel potentials on variable Lebesgue spaces
Published 2006-01-01Get full text
Article -
2542
On the Solutions and Conservation Laws of a Coupled Kadomtsev-Petviashvili Equation
Published 2013-01-01Get full text
Article -
2543
-
2544
Is Minimally Invasive Surgery the Standard of Care for Ventral Hernia Repair?
Published 2025-01-01Get full text
Article -
2545
Coassociative grammar, periodic orbits, and quantum random walk over ℤ
Published 2005-01-01Get full text
Article -
2546
Design of a Modern Car Parking at the Faculty of Engineering, Technology Aplied Design and Fine Art.
Published 2023“…This report contains several chapters giving an overview of the activities we carried out during the design of modern car parking at Nyabikoni campus. The activities include the following, Drawing plan, Demarcating the parking model using the molding board Dimensioning the model using arch card 2017 and auto card 2020 Cutting the plywood, Fixing grasses and trees using super glue.…”
Get full text
Thesis -
2547
-
2548
-
2549
-
2550
-
2551
Severe Weather Events over Southeastern Brazil during the 2016 Dry Season
Published 2018-01-01Get full text
Article -
2552
Anti-phenolic glycolipid antibodies in Mycobacterium bovis infected cattle
Published 2025-06-01Get full text
Article -
2553
-
2554
-
2555
-
2556
An oligodendrocyte silencer element underlies the pathogenic impact of lamin B1 structural variants
Published 2025-02-01Get full text
Article -
2557
-
2558
-
2559
Hymenopteran Group Foraging and Information Transfer about Resources
Published 2011-01-01Get full text
Article -
2560
DNS abnormal behavior detection based on IPFIX
Published 2014-10-01“…An algorithm based on IPFIX network flow data is proposed.By using proposed algorithm,suspicious and abnormal DNS will be detected accurately,and DNS traffic amplification attack will be distinguished rapidly.This algorithm has been applied in the Tsinghua University campus network.In our practice,DNS abnormal behaviors have been detected and alarm information has been sent to administrators.Thus,abnormal attack behaviors are restrained in time,and the monitoring and warning for abnormal traffic are all realized.…”
Get full text
Article