Showing 3,641 - 3,660 results of 67,915 for search 'DASB~', query time: 2.77s Refine Results
  1. 3641

    Evapotranspiration-Based Irrigation Scheduling for Agriculture by Isaya Kisekka, Kati W. Migliaccio, Michael D. Dukes, Bruce Schaffer, Jonathan H. Crane, Haimanote K. Bayabil, Sandra M. Guzman

    Published 2019-05-01
    “…Crane, and Bruce Schaffer, focuses on the main concepts related to ET-based irrigation scheduling and reviews the use of "smart" irrigation scheduling controllers for agricultural applications. …”
    Get full text
    Article
  2. 3642

    Aristotle, Rhetoric and Poetry based on the Pseudology by Seyyed Majid Moghimi, Alireza Fouladi, Seyed Mohammad Rastgofar, Reza Rouhani

    Published 2020-05-01
    “…The relationship between rhetoric and poetry has been the subject of experts’ controversy since the beginning of the controversy, and this controversy has continued to this day without reaching a definite conclusion. …”
    Get full text
    Article
  3. 3643

    Vision-Based Tracking of Uncooperative Targets by Suresh K. Kannan, Eric N. Johnson, Yoko Watanabe, Ramachandra Sattigeri

    Published 2011-01-01
    “…This paper presents a summary of a subset of the extensive vision-based tracking methods developed at Georgia Tech. …”
    Get full text
    Article
  4. 3644

    Synthesis of Magnetic Composite Based on Vermiculite by G. Kurmangazhi, S.M. Tazhibayeva, Haoran Zhang, K.B. Musabekov, Z.A. Tattibayeva

    Published 2024-12-01
    “… The aim of the study was to synthesize a magnetic composite based on vermiculite and to evaluate its physicochemical properties and adsorption capacity. …”
    Get full text
    Article
  5. 3645

    Are asymmetries in imperative negation based in usage? by Daniel Van Olmen

    Published 2025-01-01
    “…It proposes negation’s discourse presuppositionality, which has been argued to account for neutralization in standard negation, as an explanation for most but not all of these typological and usage-based results in imperative negation too. …”
    Get full text
    Article
  6. 3646
  7. 3647

    Steganalysis for stegotext based on text redundancy by LUO Gang, SUN Xing-ming

    Published 2009-01-01
    “…Targeted at the text steganography with mimic model,a steganalysis method based on source redundancy for stegotexts was proposed.This method processed the text and the words in it as the m-order Markov source and the source symbols respectively,then computed the redundancy of the source.Through analyzing the relationship between the re-dundancy and the size of the text,the existence of hidden information could be determined.With testing of 8 000 ste-gotexts produced by the four main softwares NiceText,Texto,Stego and Sams Big Play Maker,and 2 400 normal texts randomly sampled from innocuous texts downloaded from the Internet,the results show that the false positive rate of our steganalysis method is 0.5% and the false negative rate is 3.9%.Experiments and analyzing results indicate that the steganalysis method can effectively detect stegotexts based on natural language processing with mimic model.…”
    Get full text
    Article
  8. 3648

    Detecting LDoS attack based on ASPQ by Jing ZHANG, Hua-ping HU, Bo LIU, Feng-tao XIAO

    Published 2012-05-01
    “…Based on the analysis of the effects on average size of packet in the queue which LDoS attack makes,the change of this value was got by simulation on NS2.So detection algorithm was proposed,and was applied on Droptail and RED,which were typical queue management algorithm.The result of simulation shows that the algorithm can effectively detect the LDoS attack.…”
    Get full text
    Article
  9. 3649
  10. 3650

    Virtualized deployment of DPI based on Docker by Jie PAN, Zhao XUE

    Published 2019-12-01
    “…DPI is a kind of dedicated device for traffic identification and processing in the network of telecom operators,and a large number of DPI devices have been deployed in the network currently.However,the traditional DPI deployment brings the coexistence of multiple DPI systems,duplication of functions,and complicated maintenance and management,and it isn’t conducive to the rapid deployment of a large number of standardized DPI applications.With the development of NFV technology,virtualizing DPI deployment is a trend to solve this problem,and Docker is a container-level virtualization technology,DPI can be deployed based on it.Docker and the underlying data packet processing technology DPDK which was related to DPI deployment was described,and the Docker-based DPI virtualization deployment proposals was given.…”
    Get full text
    Article
  11. 3651
  12. 3652

    Trustworthy network based on blockchain technology by Cong LI, Bo LEI, Chongfeng XIE, Yunhe LI

    Published 2019-10-01
    “…With the frequent occurrence of network security issues,the industry had not satisfied the patch-based external security solution,and it was hoped that the endogenous security could be realized from the network architecture layer.The decentralized trustworthy network architecture was proposed.Based on the research of the security of existing network underlying protocol,a trustworthy network architecture based on decentralization technology was proposed,such as blockchain technology,which could effectively solve the problem of lack of endogenous security in existing networks.Layers implement network security to avoid malicious network attacks or network failures caused by configuration errors.…”
    Get full text
    Article
  13. 3653
  14. 3654

    Evidence-Based Cerebral Vasospasm Surveillance by Heather Kistka, Michael C. Dewan, J. Mocco

    Published 2013-01-01
    “…Invasive strategies including brain tissue oxygen monitoring, microdialysis, thermal diffusion, and jugular bulb oximetry are examined. Lastly, near-infrared spectroscopy, a recent addition to the field, is briefly reviewed. …”
    Get full text
    Article
  15. 3655

    Evapotranspiration-Based Irrigation Scheduling for Agriculture by Isaya Kisekka, Kati W. Migliaccio, Michael D. Dukes, Bruce Schaffer, Jonathan H. Crane, Haimanote K. Bayabil, Sandra M. Guzman

    Published 2019-05-01
    “…Crane, and Bruce Schaffer, focuses on the main concepts related to ET-based irrigation scheduling and reviews the use of "smart" irrigation scheduling controllers for agricultural applications. …”
    Get full text
    Article
  16. 3656

    Blind SNR estimation based on cyclostationarity by HUA Meng, ZHU Jin-kang, GONG Ming

    Published 2006-01-01
    “…Upsampling and shaping filtering introduce the cyclostationarity of transmit signals. Based on the cyclosta-tionary statistics of signals, a blind SNR estimator in AWGN channel was proposed. …”
    Get full text
    Article
  17. 3657

    Implementing Inquiry-Based Teaching Methods by Anna J. Warner, Brian E. Myers

    Published 2009-01-01
    “…AEC395/WC076: Implementing Inquiry-Based Teaching Methods (ufl.edu) …”
    Get full text
    Article
  18. 3658

    Cloud Data Center Based on SDN by Shaoyang Rao, Yunqing Chen, Ming Feng

    Published 2014-08-01
    “…Along with rapid growth of mobile internet, cloud computing and other new services, on the one hand, the traditional IDC is being transformed to cloud computing data center, on the other hand, more and more applications and data are coming to be carried on the cloud, which makes the scale of cloud data centers substantially increase, while the traditional network architecture and the technologies has been difficult to adapt to the development of the cloud data center. …”
    Get full text
    Article
  19. 3659

    Conscientious Objection Based on Patient Identity by John Dinelli

    Published 2022-11-01
    “…The AMA’s code supports conscientious objection if it is based on a   moral objection to a treatment rather than discrimination against patients.[4] From the Church Amendments to the Affordable Care Act,  federal law has protected practitioners’ rights to object to participating in treatments contrary to their religious or moral beliefs, such as abortions, sterilization, euthanasia, or physician-assisted suicide.[5] However, the language of these laws emphasizes treatment-based objection; the laws protect healthcare workers who are unwilling to participate in medical practices based on a moral objection to a treatment. …”
    Get full text
    Article
  20. 3660

    An Office-Based Procedure for Hyphema Treatment by Mikelson MomPremier, Divya Sadhwani, Saad Shaikh

    Published 2015-01-01
    “…Case Reports in Ophthalmological Medicine…”
    Get full text
    Article