-
261
On the fractality of the biological tree-like structures
Published 1999-01-01“…The fractal tree-like structures can be divided into three classes, according to the value of the similarity dimension Ds:Ds<D,Ds=D and Ds>D, where D is the topological dimension of the embedding space. …”
Get full text
Article -
262
Efek Lama Penyimpanan Asi Terhadap Kadar Protein dan Lemak yang Terkandung Didalam ASI
Published 2016-01-01“…<div class="WordSection1"><p><strong>Abstrak</strong></p><p>Penyimpanan ASI di lemari pendingin yang dilakukan oleh ibu bekerja kemungkinan bisa menyebabkan terjadinya beberapa proses biokimia seperti proteolisis dan lipolisis. …”
Get full text
Article -
263
Solutions to All-Colors Problem on Graph Cellular Automata
Published 2019-01-01“…In this paper, we further study and compute the solutions to the “All-Colors Problem,” a generalization of “All-Ones Problem,” on some interesting classes of graphs which can be divided into two subproblems: Strong-All-Colors Problem and Weak-All-Colors Problem, respectively. …”
Get full text
Article -
264
Survey on cyber deception
Published 2017-12-01“…The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.…”
Get full text
Article -
265
Savoirs mondains, savoirs savants : les femmes et leurs cabinets de curiosités au siècle des Lumières
Published 2010-01-01“…During the Enlightenment in France, curiosity culture constituted both a fashion and an intellectual and social game. …”
Get full text
Article -
266
Research on protection technology for location privacy in VANET
Published 2012-08-01Get full text
Article -
267
Caputo fractional model for the predator–prey relation with sickness in prey and refuge to susceptible prey
Published 2024-12-01“…This research develops a model describing a relation between a predator and a prey where the prey species are divided into two classes i.e., susceptible prey species and the infected prey species. …”
Get full text
Article -
268
Efek Pengurangan Durasi Tidur terhadap Jumlah dan Hitung Jenis Leukosit pada Tikus Wistar
Published 2016-09-01“…<br /><p><strong>Abstrak</strong></p><p class="Default"><em>Sleep Deprivation</em> (SD) adalah hilangnya waktu tidur komplit untuk periode tertentu ataupun durasi tidur yang lebih pendek dari waktu optimal yang dibutuhkan. …”
Get full text
Article -
269
Impact of Late Ventricular Arrhythmias on Cardiac Mortality in Patients with Acute Myocardial Infarction
Published 2019-01-01“…The timing of VT/VF occurrences had a bimodal peak. Although late VT/VF occurrence after primary PCI was less frequent than early VT/VF occurrence, patients with late VT/VF had a very poor prognosis.…”
Get full text
Article -
270
Modulatory effect of Echium plantagineum oil on the n-3 LC-PUFA biosynthetic capacity of chicken (Gallus gallus)
Published 2025-02-01“…To explore this hypothesis, 60 Canarian male chickens at 18 weeks of age were divided into three groups and fed diets differing only in their FA formulation: soy oil (SO) rich in linoleic acid (LA, 18:2n-6); linseed oil (LO) rich in ALA; and EO, a balanced LA/ALA oil also rich in SDA and γ-linolenic acid (GLA, 18:3n-6). …”
Get full text
Article -
271
Method and Algorithm for Processing Large Volume Images
Published 2023-12-01“…During development, various problematic situations were taken into account, such as using modern variable declaration syntax, using arrow functions, dividing code into smaller functions or class methods, adding comments to complex sections of code, checking for errors and exceptions, and following standards and guidelines by coding style. …”
Get full text
Article -
272
Efektivitas Penggunaan Aplikasi Open Source dalam Pembelajaran Matematika Komputer
Published 2024-11-01“…Data was collected using a questionnaire consisting of 20 statement items and divided into three aspects, namely suitability of the material, convenience and attractiveness. …”
Get full text
Article -
273
-
274
SuroTex: Surrounding texture datasetMendeley Data
Published 2025-04-01“…These number of samples are divided into 50 classes, each with 100 RGB samples of size 400 × 400 pixels. …”
Get full text
Article -
275
Aplicação do Processo Hierárquico Analítico (AHP) para o Mapeamento de Suscetibilidade ao Voçorocamento no município de Capão do Cipó – RS/Brasil
Published 2023-10-01“…Through the automated crossing of regulators (slope shapes, soils, lithology, land use and land cover), a cartographic product divided into five classes was developed: Very Low, Low, Medium, High and Very High. …”
Get full text
Article -
276
Students’ Strategies in Translating English Idioms into Bahasa Indonesia of English Language Education
Published 2021-12-01“…The researchers used descriptive qualitative research, and the subjects of this research were 50 students batch 2017 of English Department Universitas Lambung Mangkurat in translation class. The instruments to collect the data were a test and a questionnaire. …”
Get full text
Article -
277
Differentiated services dynamic spectrum access strategy for cognitive wireless mesh network
Published 2014-03-01“…Dynamic spectrum access (DSA) is an important design aspect for cognitive radio network.Common access of multi-type services having different quality of service (QoS) requirements is the important characteristic of cognitive wireless mesh network.Differentiated service (DS) is the key to realize the high efficiency use of spectrum resources and to guarantee the high quality transmission of services.In order to satisfy the demand for multi-type services,a differentiated services dynamic spectrum access strategy was proposed.In this strategy,the unlicensed user traffic was divided into three priority classes.The DSA scheme uses different access mechanisms for the three classes of unlicensed users.The real-time traffic selectes available channel set according to the shortest expected delay to reduce the transmission time and the probability of appearance of licensed user during data transmission process.The general traffic selectes the channel of largest successful transmission probability to avoid spectrum handoff.The theoretical and experimental results show that,when compared with the traditional cognitive networks DSA strategy,the proposed strategy is able to guarantee different QoS for the various services,shorter transmission delay for higher priority services,reducing the probability of transmission interruption and better throughput performance when the vacancy rate of licensed channel is major and heavy network load.…”
Get full text
Article -
278
Modeling the effect of information campaigns on the HIV epidemic in Uganda
Published 2008-09-01“…These campaigns affect people's behavior andcan divide the susceptibles class into subclasses with different infectivity rates.Our model is a system of ordinary differential equations and we use data about theepidemics and the number of organizations involved in the campaigns to estimatethe model parameters. …”
Get full text
Article -
279
The scrutiny of geomorphologic effects of Armaghankhane and Taham faults
Published 2016-12-01“…Rivers that don’t have a wide catchment upper their front mount are running in parallel deep valleys that the topographical situations don’t let them to receive around surface runoffs. …”
Get full text
Article -
280
Teaching Process and Emotional Reactions in Mathematics
Published 2022-07-01“…Unfortunately, statements such as "not for me", "I don't know math" and "my mom is not a mathematician" can often be heard from students. …”
Get full text
Article