Showing 2,341 - 2,360 results of 4,506 for search '"counting"', query time: 0.05s Refine Results
  1. 2341

    Les difficultés de la filière brésilienne face à la nouvelle organisation mondiale du négoce des pierres de couleur by Aurélien Reys

    Published 2012-11-01
    “…Nevertheless, with an increasing number of people reaching good standards of living through the world, the gemstones trade will probably continue to grow in the near future, keeping the door open to new opportunities for countries like Brazil, which one can count on a growing middle class that may represent soon a new chance for its gem industry.…”
    Get full text
    Article
  2. 2342

    Violência de gênero em áreas rurais: o caso de Santana do Livramento (RS) by Cassiane da Costa, Martha Giudice Narvaz, Kelly Camargo

    Published 2018-01-01
    “…Rural women who suffer violence can count on a support network in town, which is essential, although some improvement is still necessary in the structural scope and in the integration of the work.…”
    Get full text
    Article
  3. 2343

    Integration of a Quantum Voting Scheme into Grayscale Images Using the Novel Enhanced Quantum Representation and Qiskit Framework by Alexandru-Gabriel Tudorache, Vasile Manta, Simona Caraiman

    Published 2022-01-01
    “…A server is also used, not only to count but also to guarantee the integrity of the votes (which is done inherently, by its design and quantum properties). …”
    Get full text
    Article
  4. 2344

    Data-driven modeling of background radiation structure utilizing matrix profile in nuclear security by Miltiadis Alamaniotis

    Published 2025-01-01
    “…Additionally, MP modeling outperformed the traditional method of using raw measurement averages, particularly in generating distinct models for low-count backgrounds from different locations.…”
    Get full text
    Article
  5. 2345

    The Persistence of Buildings and the Context Problem by Fabio Bacchini

    Published 2017-07-01
    “…I also try to explain why the change from thirteenth century Paris to contemporary Paris proved not to be lethal to Notre Dame’s persistence, in spite of its being more significant than other imaginary context changes that we would easily count as fatal.…”
    Get full text
    Article
  6. 2346

    (1→3)-β-D-glucan in patients with pulmonary aspergilloma by Kazumi Yuasa, Hajime Goto

    Published 1997-01-01
    “…Other parameters, such as galactomannan, immunodiffusion and a radio-allergosorbent test, as well as inflammatory m arkers such as C-reactive protein and the leukocyte count, did not show any consistent tendency in regard to the activity of the disease. …”
    Get full text
    Article
  7. 2347

    A Recurrent Headache by Joe Dylewski

    Published 2006-01-01
    “…The peripheral white blood cell count was 10.5x109/L, with 8.0x109/L neutrophils.…”
    Get full text
    Article
  8. 2348

    Comparative Dynamic Seismic Analyses of RC Minarets Strengthened with FRP and Buttresses by Erdem Türkeli

    Published 2020-01-01
    “…These structures can be counted as the most common constructed slender structures in Turkey. …”
    Get full text
    Article
  9. 2349

    App-DDoS detection method using partial binary tree based SVM algorithm by Bin ZHANG, Zihao LIU, Shuqin DONG, Lixun LI

    Published 2018-03-01
    “…As it ignored the detection of ramp-up and pulsing type of application layer DDoS (App-DDoS) attacks in existing flow-based App-DDoS detection methods,an effective detection method for multi-type App-DDoS was proposed.Firstly,in order to fast count the number of HTTP GET for users and further support the calculation of feature parameters applied in detection method,the indexes of source IP address in multiple time windows were constructed by the approach of Hash function.Then the feature parameters by combining SVM classifiers with the structure of partial binary tree were trained hierarchically,and the App-DDoS detection method was proposed with the idea of traversing binary tree and feedback learning to distinguish non-burst normal flow,burst normal flow and multi-type App-DDoS flows.The experimental results show that compared with the conventional SVM-based and naïve-Bayes-based detection methods,the proposed method has more excellent detection performance and can distinguish specific App-DDoS types through subdividing attack types and training detection model layer by layer.…”
    Get full text
    Article
  10. 2350

    Effects of Ischemic Acute Kidney Injury on Lung Water Balance: Nephrogenic Pulmonary Edema? by Rajit K. Basu, Derek Wheeler

    Published 2011-01-01
    “…Pro-inflammatory gene upregulation, chemokine over-expression, altered biochemical channel function, and apoptotic dysregulation manifest in the lung are now understood as “extra-renal” and pulmonary effects of AKI. AKI should be counted as a disease process that alters the endothelial integrity of the alveolar capillary barrier and has the potential to overpower the ability of the lung to regulate fluid balance. …”
    Get full text
    Article
  11. 2351

    A Morphological Model for Extracting Road Networks from High-Resolution Satellite Images by Mohamad M. Awad

    Published 2013-01-01
    “…The positional accuracy of the extracted road features compared to the manual digitized ones, the counted number of detected road segments, and the percentage of completely closed and partially closed curves prove the efficiency and accuracy of the new model.…”
    Get full text
    Article
  12. 2352

    A combined method for the treatment of grade IV internal haemorrhoidal disease by Georgios-Ioannis Verras, Francesk Mulita, George Theofanis, Levan Tchabashvili, Ioannis Perdikaris, Theano Perri, Charalampos Kaplanis, Dimitrios Filis

    Published 2022-01-01
    “…Digital palpation of the rectum returned stool of normal consistency, as well as ample fresh blood. Complete blood count report returned hemoglobin (Hb) values of 7.0 g/dl and hematocrit (Hct) of 24.3% in addition to marked neutrophilia (73.9%), indicating severe acute blood loss.…”
    Get full text
    Article
  13. 2353

    Goal-line oracles: Exploring accuracy of wisdom of the crowd for football predictions. by Jens Koed Madsen

    Published 2025-01-01
    “…Participants predicted team goal counts, which were then compared to actual expected goals (XG) and match results. …”
    Get full text
    Article
  14. 2354

    Die Waardes, Verwagtings en Bevredigings van Suid-Afrikaanse T elevisienuuskykers by Linda Venter, Nina Overton

    Published 2022-11-01
    “…To cast addi tional light on the relative lower correlation between expectations and gratifications, the degree of dependence on television news as primary source was taken into ac count. …”
    Get full text
    Article
  15. 2355

    L’historiographie des actes de la pratique : l’écriture de la conquête normande dans les actes de Sicile et de Calabre du milieu du XIe siècle au début du XIIIe siècle by Annick Peters-Custot

    Published 2015-06-01
    “…The only cases of historiographical writing are actually those of revision, that is to say they are the result of documentary manipulation, such as forgery or interpolation found in Count Roger Ist’s diplomatic production. In general, not the rulers but the monasteries housing the charters in their archives were responsible for the re-writing. …”
    Get full text
    Article
  16. 2356

    Video Traffic Flow Analysis in Distributed System during Interactive Session by Soumen Kanrar, Niranjan Kumar Mandal

    Published 2016-01-01
    “…The proposed session based optimum storage finding algorithm reduces the search hop count towards the remote storage-data server. The modeling and simulation result shows the better impact over the distributed system architecture. …”
    Get full text
    Article
  17. 2357

    Dissolved State and Identity in John Maxwell Coetzee’s Life and Times of Michael K within the scope of the Postcolonial Other by İsmail Avcu

    Published 2022-10-01
    “…It makes no difference if Michael K is conscious of his heroic resistance or not; what counts is that he says very little because he has nothing to say. …”
    Get full text
    Article
  18. 2358

    A survey on the microbiological quality of mixed feeds and feedstuffs l'sed in hatay province by Zeynep Erdoğan, Özkan Aslantaş

    “…This study was carried out to determine Ihe microbiological quality of 50 mixed feeds and feedstuffs samples by examining the total counts of bactena and fungi obtained from Hatay, Antakya. …”
    Get full text
    Article
  19. 2359

    Network threat situation assessment based on unsupervised multi-source data feature analysis by Hongyu YANG, Fengyan WANG

    Published 2020-02-01
    “…Aiming at the limitations of supervised neural network in the network threat testing task relying on data category tagging,a network threat situation evaluation method based on unsupervised multi-source data feature analysis was proposed.Firstly,a variant auto encoder-generative adversarial network (V-G) for security threat assessment was designed.The training data set containing only normal network traffic was input to the network collection layer of V-G to perform the model training,and the reconstruction error of the network output of each layer was calculated.Then,the reconstruction error learning was performed by the three-layer variation automatic encoder of the output layer,and the training abnormal threshold was obtained.The packet threat was tested by using the test data set containing the abnormal network traffic,and the probability of occurrence of the threat of each group of tests was counted.Finally,the severity of the network security threat was determined according to the probability of threat occurrence,and the threat situation value was calculated according to the threat impact to obtain the network threat situation.The simulation results show that the proposed method has strong characterization ability for network threats,and can effectively and intuitively evaluate the overall situation of network threat.…”
    Get full text
    Article
  20. 2360

    Zero trust management of data flow between IoT edge nodes based on SDN by XIAO Jingxu, GUO Yuanbo, CHANG Chaowen, WU Ping, YANG Chenli

    Published 2024-07-01
    “…In the forwarding path, the security verification of packets was performed by the switching node, and the verification information was counted to ensure the security of the data flow transmission and the consistency of the path. …”
    Get full text
    Article