Showing 261 - 280 results of 342 for search 'A Class Divided', query time: 0.13s Refine Results
  1. 261

    On the fractality of the biological tree-like structures by Jaan Kalda

    Published 1999-01-01
    “…The fractal tree-like structures can be divided into three classes, according to the value of the similarity dimension Ds:Ds<D,Ds=D and Ds>D, where D is the topological dimension of the embedding space. …”
    Get full text
    Article
  2. 262

    Efek Lama Penyimpanan Asi Terhadap Kadar Protein dan Lemak yang Terkandung Didalam ASI by Indri Putri Sari, Ariadi ., Ety Yerizel

    Published 2016-01-01
    “…<div class="WordSection1"><p><strong>Abstrak</strong></p><p>Penyimpanan ASI di lemari pendingin yang dilakukan oleh ibu bekerja kemungkinan bisa menyebabkan terjadinya beberapa proses biokimia seperti proteolisis dan lipolisis. …”
    Get full text
    Article
  3. 263

    Solutions to All-Colors Problem on Graph Cellular Automata by Xiaoyan Zhang, Chao Wang

    Published 2019-01-01
    “…In this paper, we further study and compute the solutions to the “All-Colors Problem,” a generalization of “All-Ones Problem,” on some interesting classes of graphs which can be divided into two subproblems: Strong-All-Colors Problem and Weak-All-Colors Problem, respectively. …”
    Get full text
    Article
  4. 264

    Survey on cyber deception by Zhao-peng JIA, Bin-xing FANG, Chao-ge LIU, Qi-xu LIU, Jian-bao LIN

    Published 2017-12-01
    “…The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.…”
    Get full text
    Article
  5. 265

    Savoirs mondains, savoirs savants : les femmes et leurs cabinets de curiosités au siècle des Lumières by Adeline Gargam

    Published 2010-01-01
    “…During the Enlightenment in France, curiosity culture constituted both a fashion and an intellectual and social game.  …”
    Get full text
    Article
  6. 266
  7. 267

    Caputo fractional model for the predator–prey relation with sickness in prey and refuge to susceptible prey by Shivani Sharma, Ravi Shanker Dubey, Arun Chaudhary

    Published 2024-12-01
    “…This research develops a model describing a relation between a predator and a prey where the prey species are divided into two classes i.e., susceptible prey species and the infected prey species. …”
    Get full text
    Article
  8. 268

    Efek Pengurangan Durasi Tidur terhadap Jumlah dan Hitung Jenis Leukosit pada Tikus Wistar by Wahyu Tri Novriansyah, Ellyza Nasrul, Rosfita Rasyid

    Published 2016-09-01
    “…<br /><p><strong>Abstrak</strong></p><p class="Default"><em>Sleep Deprivation</em> (SD) adalah hilangnya waktu tidur komplit  untuk periode tertentu ataupun durasi tidur yang lebih pendek dari waktu optimal yang dibutuhkan. …”
    Get full text
    Article
  9. 269

    Impact of Late Ventricular Arrhythmias on Cardiac Mortality in Patients with Acute Myocardial Infarction by Takuma Takada, Koki Shishido, Takahiro Hayashi, Shohei Yokota, Hirokazu Miyashita, Hiroaki Yokoyama, Takashi Nishimoto, Tomoki Ochiai, Noriaki Moriyama, Kazuki Tobita, Shingo Mizuno, Futoshi Yamanaka, Masato Murakami, Yutaka Tanaka, Saeko Takahashi, Shigeru Saito

    Published 2019-01-01
    “…The timing of VT/VF occurrences had a bimodal peak. Although late VT/VF occurrence after primary PCI was less frequent than early VT/VF occurrence, patients with late VT/VF had a very poor prognosis.…”
    Get full text
    Article
  10. 270

    Modulatory effect of Echium plantagineum oil on the n-3 LC-PUFA biosynthetic capacity of chicken (Gallus gallus) by Jesús Villora, José Antonio Pérez, Nieves Guadalupe Acosta, Deiene Rodríguez-Barreto, Pedro Juan Alonso, Mónica B. Betancor, Alexandr Torres, Sergio Álvarez, Covadonga Rodríguez

    Published 2025-02-01
    “…To explore this hypothesis, 60 Canarian male chickens at 18 weeks of age were divided into three groups and fed diets differing only in their FA formulation: soy oil (SO) rich in linoleic acid (LA, 18:2n-6); linseed oil (LO) rich in ALA; and EO, a balanced LA/ALA oil also rich in SDA and γ-linolenic acid (GLA, 18:3n-6). …”
    Get full text
    Article
  11. 271

    Method and Algorithm for Processing Large Volume Images by O. N. Andreichuk, N. I. Listopad

    Published 2023-12-01
    “…During development, various problematic situations were taken into account, such as using modern variable declaration syntax, using arrow functions, dividing code into smaller functions or class methods, adding comments to complex sections of code, checking for errors and exceptions, and following standards and guidelines by coding style. …”
    Get full text
    Article
  12. 272

    Efektivitas Penggunaan Aplikasi Open Source dalam Pembelajaran Matematika Komputer by I Made Dedy setiawan

    Published 2024-11-01
    “…Data was collected using a questionnaire consisting of 20 statement items and divided into three aspects, namely suitability of the material, convenience and attractiveness. …”
    Get full text
    Article
  13. 273
  14. 274

    SuroTex: Surrounding texture datasetMendeley Data by Muhammad Ardi Putra, Wahyono, Agus Harjoko

    Published 2025-04-01
    “…These number of samples are divided into 50 classes, each with 100 RGB samples of size 400 × 400 pixels. …”
    Get full text
    Article
  15. 275

    Aplicação do Processo Hierárquico Analítico (AHP) para o Mapeamento de Suscetibilidade ao Voçorocamento no município de Capão do Cipó – RS/Brasil by Antônio Von Ende Dotto, Marinéli Moraes Gaberti, Luís Eduardo de Souza Robaina

    Published 2023-10-01
    “…Through the automated crossing of regulators (slope shapes, soils, lithology, land use and land cover), a cartographic product divided into five classes was developed: Very Low, Low, Medium, High and Very High. …”
    Get full text
    Article
  16. 276

    Students’ Strategies in Translating English Idioms into Bahasa Indonesia of English Language Education by Nadilla Ariyani, Rina Listia, Elvina Arapah

    Published 2021-12-01
    “…The researchers used descriptive qualitative research, and the subjects of this research were 50 students batch 2017 of English Department Universitas Lambung Mangkurat in translation class. The instruments to collect the data were a test and a questionnaire. …”
    Get full text
    Article
  17. 277

    Differentiated services dynamic spectrum access strategy for cognitive wireless mesh network by Rui-fang LI, Quan LIU, Ren-fa LI

    Published 2014-03-01
    “…Dynamic spectrum access (DSA) is an important design aspect for cognitive radio network.Common access of multi-type services having different quality of service (QoS) requirements is the important characteristic of cognitive wireless mesh network.Differentiated service (DS) is the key to realize the high efficiency use of spectrum resources and to guarantee the high quality transmission of services.In order to satisfy the demand for multi-type services,a differentiated services dynamic spectrum access strategy was proposed.In this strategy,the unlicensed user traffic was divided into three priority classes.The DSA scheme uses different access mechanisms for the three classes of unlicensed users.The real-time traffic selectes available channel set according to the shortest expected delay to reduce the transmission time and the probability of appearance of licensed user during data transmission process.The general traffic selectes the channel of largest successful transmission probability to avoid spectrum handoff.The theoretical and experimental results show that,when compared with the traditional cognitive networks DSA strategy,the proposed strategy is able to guarantee different QoS for the various services,shorter transmission delay for higher priority services,reducing the probability of transmission interruption and better throughput performance when the vacancy rate of licensed channel is major and heavy network load.…”
    Get full text
    Article
  18. 278

    Modeling the effect of information campaigns on the HIV epidemic in Uganda by Hem Joshi, Suzanne Lenhart, Kendra Albright, Kevin Gipson

    Published 2008-09-01
    “…These campaigns affect people's behavior andcan divide the susceptibles class into subclasses with different infectivity rates.Our model is a system of ordinary differential equations and we use data about theepidemics and the number of organizations involved in the campaigns to estimatethe model parameters. …”
    Get full text
    Article
  19. 279

    The scrutiny of geomorphologic effects of Armaghankhane and Taham faults by gholam hassan jafari, Asghar rostamkhani

    Published 2016-12-01
    “…Rivers that don’t have a wide catchment upper their front mount are running in parallel deep valleys that the topographical situations don’t let them to receive around surface runoffs. …”
    Get full text
    Article
  20. 280

    Teaching Process and Emotional Reactions in Mathematics by Shiv Kant Tiwari, Dragan Obradovic, Laxmi Rathour, Lakshmi Narayan Mishra, Vishnu Narayan Mishra

    Published 2022-07-01
    “…Unfortunately, statements such as "not for me", "I don't know math" and "my mom is not a mathematician" can often be heard from students. …”
    Get full text
    Article