Showing 13,101 - 13,120 results of 13,669 for search 'Skurge~', query time: 2.48s Refine Results
  1. 13101

    Sign changes of the partial sums of a random multiplicative function II by Aymone, Marco

    Published 2024-10-01
    “…We prove that the partial sums $\sum _{n\le x}f^*(n)$ and $\sum _{n\le x}\frac{f(n)}{\sqrt{n}}$ change sign infinitely often as $x\rightarrow \infty $, almost surely. The case $\sum _{n\le x}\frac{f^*(n)}{\sqrt{n}}$ is left as an open question and we stress the possibility of only a finite number of sign changes, with positive probability.…”
    Get full text
    Article
  2. 13102

    Bone Health by Jacob Young, Jennifer Hillan

    Published 2012-10-01
    “…“When planning your family meals, you probably try to make sure your children get enough calcium and vitamin D, perhaps including a fresh cup of milk. …”
    Get full text
    Article
  3. 13103

    AB DENİZ GÜVENLİĞİ STRATEJİSİ: TEORİK BİR İNCELEME by Kübra Çoban Hastunç

    Published 2022-12-01
    “…Üye devletlerin başlangıçta karşı çıktıkları AB Deniz Güvenliği Stratejisi’ni (ABDGS) (EU Maritime Security Strategy-EUMSS) kısa bir süre sonra kabul etmesinde hangi itici güçler etkili olmuştur? …”
    Get full text
    Article
  4. 13104

    A secure method of voting and planning based on quadratic voting by Hamid Devisti, Massoud Hadian Dehkordi

    Published 2025-02-01
    “…This protocol gives the voters to check the verifiability of ballots and the safety of payment so that they would be sure that their votes are counted correctly.…”
    Get full text
    Article
  5. 13105

    Essential oil and furanosesquiterpenes from myrrh oleo-gum resin: a breakthrough in mosquito vector management by Eleonora Spinozzi, Marta Ferrati, Cecilia Baldassarri, Paolo Rossi, Guido Favia, Giorgio Cameli, Giovanni Benelli, Angelo Canale, Livia De Fazi, Roman Pavela, Luana Quassinti, Cristiano Giordani, Fabrizio Araniti, Loredana Cappellacci, Riccardo Petrelli, Filippo Maggi

    Published 2025-01-01
    “…Herein, the larvicidal potential of its essential oil (EO) was assessed on four mosquito species (Aedes albopictus Skuse, Aedes aegypti L., Anopheles gambiae Giles and Anopheles stephensi Liston), with LC50 values ranging from 4.42 to 16.80 μg/mL. …”
    Get full text
    Article
  6. 13106

    Sistem Informasi Geografi untuk Analisis Potensi Sumber Daya Lahan Pesisir Kepulauan Padaido Kabupaten Biak Numfor, Papua by Rosalina Giovani Mandowen, Rinto H Mambrasar

    Published 2021-10-01
    “…Teknik pengolahan dan analisis data ini menggunakan software SIG yakni ArcGIS 10.1 dengan model skoring dan overlay. Hasil penelitian dengan studi kasus Kepulauan Padaido ini dapat disimpulkan bahwa saat ini dengan adanya SIG yang dibangun, Pemerintah Daerah Biak Numfor sudah dapat mengolah lahan pesisir untuk dimanfaatkan sesuai dengan potensi lahan yang seharusnya, seperti potensi lahan untuk usaha budidaya rumput laut seluas 13.269,41 ha atau 94%, untuk budidaya teripang seluas 7.069,91 ha atau 83%, sebagai aktifitas pariwisata pesisir seluas 7.778,45 ha atau 86%, sebagai kegiatan konservasi seluas 2.957,54 ha atau 163%, untuk daerah tangkapan ikan karang seluas 2.078,92 ha atau 80%, dan sebagai daerah tangkapan ikan pelagis 1.585,61 ha atau 87%.   …”
    Get full text
    Article
  7. 13107

    Kidney and liver histopathology of sea bass Lates calcarifer infected with black body syndrome-associated bacteria by Sri Nuryati, Mauliza Yanti, Rahman, Sutiastuti Wahyuwardani

    Published 2023-08-01
    “…Derajat kerusakan histopatologi ditentukan dengan melakukan skoring perubahan histopatologi jaringan di bawah mikroskop dengan perbesaran 40×10 pada lima lapang pandang. …”
    Get full text
    Article
  8. 13108

    İbâdî Fırak Literatüründe Şehristânî Etkisi -Kalhâtî Örneği- by Kadir Gömbeyaz

    Published 2015-09-01
    “…Bununörneklerinden biri Şehristânî’den kısa bir süre sonra yaşadığı anlaşılanUman’ın Kalhât şehrinden İbâdî âlim Ebû Abdillâh el-Kalhâtî’nin (ö.7./13. yy) el-Keşf ve’l-beyân adlı eseridir. …”
    Get full text
    Article
  9. 13109

    Approach on runtime monitoring based on the embedded trusted platforms by Zhao-chang SUN, Jian-feng MA, Cong SUN, Di LU

    Published 2017-10-01
    “…The state-of-art trusted computing platforms fall short of monitoring its own runtime security properties.In order to mitigate these problems,an approach on runtime monitoring for the embedded trusted platforms was proposed.With the automated code instrumentation and the runtime monitoring,that the runtime security functionalities were consistent with the design specifications of trusted computing platforms could be made sure.The system performance and states meet specific constraints could also be ensured.The runtime exceptions on the specific properties were handled in real-time.The experimental results show that with the increase on the number of monitoring nodes,the precision and real-time performance of proposed runtime monitoring increase.Meanwhile,the costs on the monitoring and the exception handling are moderate.…”
    Get full text
    Article
  10. 13110

    Stochastic Predator-Prey System Subject to Lévy Jumps by Xinzhu Meng, Xiaohong Wang

    Published 2016-01-01
    “…In addition, we obtain the sufficient conditions for almost sure permanence in mean and stochastic permanence of the system by using the theory of impulsive stochastic differential equations. …”
    Get full text
    Article
  11. 13111

    Secret level valuation method of BLP model based on some application properties by Chan DONG, Xiu-bin FAN, You-wen LI, Jian-rong WANG

    Published 2013-09-01
    “…According to the access attribute properties between subjects and objects in the information system,a viable method of the BLP model secret level valuation was given,and two merging conditions were put forward.The mathematical model of subject-object secret level valuation under BLP model was established on the two merging conditions.When the condition solution was not the constant one,its expansion solution being not sure the global one was proved,but the approximate condition modification valuation solution could be obtained from it.Using the above results,one difficult problem from one national information system about the BLP model secret level valuation was solved.…”
    Get full text
    Article
  12. 13112

    The effect of patterns of infectiousness on epidemic size by Luis F. Gordillo, Stephen A. Marion, Priscilla E. Greenwood

    Published 2008-05-01
    “…We postulate a stochasticinfectiousness process for each individual with an almost surely finite integral,or total infectiousness. Individuals also have different contact rates. …”
    Get full text
    Article
  13. 13113

    Designing Online Mediation: Does “Just Add Tech” Undermine Mediation’s Ownmost Aim? by David W. Johnson

    Published 2020-03-01
    “…This article asks whether these thoroughly time-tested and -refined norms specific to mediation will port over, relatively intact, into virtual space. To be sure, the answer will be seen in how designers build and implement the virtual spaces and attendant automation technology. …”
    Get full text
    Article
  14. 13114

    THE STRUCTURE STRENGTH ANALYSIS ON THE FURROW PLOUGH IN THE AGRICULTURAL MACHINERY by ZHANG ChunLing

    Published 2016-01-01
    “…The furrow plough’s strength was designed by theoretical analyses and experimental strain analyses to make sure the design reasonable and accurate. As fully-loaded tractors run at a low speed,by theoretically analyzing the stretch-bending combined-deformation strength,the calculated results were used as design basis. …”
    Get full text
    Article
  15. 13115

    Apprentissage et tabellionage à Rouen (1360-1421) : qu’enregistrent les contrats écrits ? by François Rivière

    Published 2021-07-01
    “…Independently from craft guilds, the parties, especially orphans or adult apprentices, resorted to written agreements to make sure that their obligations were reciprocal or that financially substantial and/or long term commitments were honoured.…”
    Get full text
    Article
  16. 13116

    'n Eksegeties-teologiese interpretasie van Habakuk 3 by S. D. Snyman

    Published 2003-12-01
    “…In the mean time believers must patiently await His intervention which will surely happen in due course. …”
    Get full text
    Article
  17. 13117

    A Guide to Tracking Physical Activity by Madison K. Keesling, Anne E. Mathews

    Published 2016-08-01
    “…One proven strategy to make sure you reach your activity goal is to track your energy expenditure. …”
    Get full text
    Article
  18. 13118

    Frequent-pattern discovering algorithm for large-scale corpus by GONG Cai-chun1, HE Min1, CHEN Hai-qiang1, XU Hong-bo1, CHENG Xue-qi1

    Published 2007-01-01
    “…A memory-based frequent-pattern discovering algorithm for large-scale corpus was presented.First,the origi-nal corpus was partitioned into several parts using appropriate dividing policy.Then each partition was processed inde-pendently to produce a temporary result,and the union of all temporary results is the final frequent-pattern set.The algo-rithm prunes a subtree once it is sure that none of the corresponding pattern will be frequent.Experiment shows that it takes no more than 1.6 gigabytes of memory to discover all patterns appearing more than 100 times for a 3.6 gigabytes news corpus,the average speed is 3.28 magabytes per second.…”
    Get full text
    Article
  19. 13119

    Nematode Management for Bedding Plants by William T. Crow

    Published 2014-02-01
    “… Florida is the “land of flowers.” Surely, one of the things that Florida is known for is the beauty of its vegetation. …”
    Get full text
    Article
  20. 13120

    Reliable heuristic mapping method for survivable virtual network by Qiang ZHU, Hui-qiang WANG, Chun-guang MA, Guang-sheng FENG, Hong-wu LV

    Published 2015-07-01
    “…For reliable virtual network mapping problem,virtual network survivability constraints are introduced to ensure that the rest of the mapped virtual network remains connected under a single node failure condition in the substrate network,which makes sure the completeness of the virtual network and continuity of services.In order to reduce cost of the substrate network,the reliable heuristic mapping problem is considered as an integer linear programming model and a reliable heuristic mapping method for survivable virtual network is proposed to solve the problem.The simulation results show that average usage of links is reduced and the success rate,average revenue of mapping,recovery success rate of virtual network are increased compared with the existing reliable mapping algorithms.…”
    Get full text
    Article