Suggested Topics within your search.
Suggested Topics within your search.
- methods 4
- Criminal law 3
- Arithmetic 2
- Biochemistry 2
- Chemistry, Clinical 2
- Health and Fitness 2
- ART / Digital 1
- Academic writing 1
- Agricultural innovations 1
- Agricultural productivity 1
- Anesthesia 1
- Anesthesiology 1
- Blogueurs vidéo 1
- Buildings 1
- Childhood and youth 1
- Communication in rehabilitation 1
- Compagnons imaginaires 1
- Computer animation 1
- Criminal investigation 1
- Critical Care 1
- Critical care medicine 1
- Description and travel 1
- Diabetes 1
- Diabetes Mellitus, Type 2 1
- Diagnostic ultrasonic imaging 1
- Digital cinematography 1
- Digital watermarking 1
- Diseases 1
- Dissertations, Academic 1
- Electric circuit analysis 1
-
13101
Sign changes of the partial sums of a random multiplicative function II
Published 2024-10-01“…We prove that the partial sums $\sum _{n\le x}f^*(n)$ and $\sum _{n\le x}\frac{f(n)}{\sqrt{n}}$ change sign infinitely often as $x\rightarrow \infty $, almost surely. The case $\sum _{n\le x}\frac{f^*(n)}{\sqrt{n}}$ is left as an open question and we stress the possibility of only a finite number of sign changes, with positive probability.…”
Get full text
Article -
13102
Bone Health
Published 2012-10-01“…“When planning your family meals, you probably try to make sure your children get enough calcium and vitamin D, perhaps including a fresh cup of milk. …”
Get full text
Article -
13103
AB DENİZ GÜVENLİĞİ STRATEJİSİ: TEORİK BİR İNCELEME
Published 2022-12-01“…Üye devletlerin başlangıçta karşı çıktıkları AB Deniz Güvenliği Stratejisi’ni (ABDGS) (EU Maritime Security Strategy-EUMSS) kısa bir süre sonra kabul etmesinde hangi itici güçler etkili olmuştur? …”
Get full text
Article -
13104
A secure method of voting and planning based on quadratic voting
Published 2025-02-01“…This protocol gives the voters to check the verifiability of ballots and the safety of payment so that they would be sure that their votes are counted correctly.…”
Get full text
Article -
13105
Essential oil and furanosesquiterpenes from myrrh oleo-gum resin: a breakthrough in mosquito vector management
Published 2025-01-01“…Herein, the larvicidal potential of its essential oil (EO) was assessed on four mosquito species (Aedes albopictus Skuse, Aedes aegypti L., Anopheles gambiae Giles and Anopheles stephensi Liston), with LC50 values ranging from 4.42 to 16.80 μg/mL. …”
Get full text
Article -
13106
Sistem Informasi Geografi untuk Analisis Potensi Sumber Daya Lahan Pesisir Kepulauan Padaido Kabupaten Biak Numfor, Papua
Published 2021-10-01“…Teknik pengolahan dan analisis data ini menggunakan software SIG yakni ArcGIS 10.1 dengan model skoring dan overlay. Hasil penelitian dengan studi kasus Kepulauan Padaido ini dapat disimpulkan bahwa saat ini dengan adanya SIG yang dibangun, Pemerintah Daerah Biak Numfor sudah dapat mengolah lahan pesisir untuk dimanfaatkan sesuai dengan potensi lahan yang seharusnya, seperti potensi lahan untuk usaha budidaya rumput laut seluas 13.269,41 ha atau 94%, untuk budidaya teripang seluas 7.069,91 ha atau 83%, sebagai aktifitas pariwisata pesisir seluas 7.778,45 ha atau 86%, sebagai kegiatan konservasi seluas 2.957,54 ha atau 163%, untuk daerah tangkapan ikan karang seluas 2.078,92 ha atau 80%, dan sebagai daerah tangkapan ikan pelagis 1.585,61 ha atau 87%. …”
Get full text
Article -
13107
Kidney and liver histopathology of sea bass Lates calcarifer infected with black body syndrome-associated bacteria
Published 2023-08-01“…Derajat kerusakan histopatologi ditentukan dengan melakukan skoring perubahan histopatologi jaringan di bawah mikroskop dengan perbesaran 40×10 pada lima lapang pandang. …”
Get full text
Article -
13108
İbâdî Fırak Literatüründe Şehristânî Etkisi -Kalhâtî Örneği-
Published 2015-09-01“…Bununörneklerinden biri Şehristânî’den kısa bir süre sonra yaşadığı anlaşılanUman’ın Kalhât şehrinden İbâdî âlim Ebû Abdillâh el-Kalhâtî’nin (ö.7./13. yy) el-Keşf ve’l-beyân adlı eseridir. …”
Get full text
Article -
13109
Approach on runtime monitoring based on the embedded trusted platforms
Published 2017-10-01“…The state-of-art trusted computing platforms fall short of monitoring its own runtime security properties.In order to mitigate these problems,an approach on runtime monitoring for the embedded trusted platforms was proposed.With the automated code instrumentation and the runtime monitoring,that the runtime security functionalities were consistent with the design specifications of trusted computing platforms could be made sure.The system performance and states meet specific constraints could also be ensured.The runtime exceptions on the specific properties were handled in real-time.The experimental results show that with the increase on the number of monitoring nodes,the precision and real-time performance of proposed runtime monitoring increase.Meanwhile,the costs on the monitoring and the exception handling are moderate.…”
Get full text
Article -
13110
Stochastic Predator-Prey System Subject to Lévy Jumps
Published 2016-01-01“…In addition, we obtain the sufficient conditions for almost sure permanence in mean and stochastic permanence of the system by using the theory of impulsive stochastic differential equations. …”
Get full text
Article -
13111
Secret level valuation method of BLP model based on some application properties
Published 2013-09-01“…According to the access attribute properties between subjects and objects in the information system,a viable method of the BLP model secret level valuation was given,and two merging conditions were put forward.The mathematical model of subject-object secret level valuation under BLP model was established on the two merging conditions.When the condition solution was not the constant one,its expansion solution being not sure the global one was proved,but the approximate condition modification valuation solution could be obtained from it.Using the above results,one difficult problem from one national information system about the BLP model secret level valuation was solved.…”
Get full text
Article -
13112
The effect of patterns of infectiousness on epidemic size
Published 2008-05-01“…We postulate a stochasticinfectiousness process for each individual with an almost surely finite integral,or total infectiousness. Individuals also have different contact rates. …”
Get full text
Article -
13113
Designing Online Mediation: Does “Just Add Tech” Undermine Mediation’s Ownmost Aim?
Published 2020-03-01“…This article asks whether these thoroughly time-tested and -refined norms specific to mediation will port over, relatively intact, into virtual space. To be sure, the answer will be seen in how designers build and implement the virtual spaces and attendant automation technology. …”
Get full text
Article -
13114
THE STRUCTURE STRENGTH ANALYSIS ON THE FURROW PLOUGH IN THE AGRICULTURAL MACHINERY
Published 2016-01-01“…The furrow plough’s strength was designed by theoretical analyses and experimental strain analyses to make sure the design reasonable and accurate. As fully-loaded tractors run at a low speed,by theoretically analyzing the stretch-bending combined-deformation strength,the calculated results were used as design basis. …”
Get full text
Article -
13115
Apprentissage et tabellionage à Rouen (1360-1421) : qu’enregistrent les contrats écrits ?
Published 2021-07-01“…Independently from craft guilds, the parties, especially orphans or adult apprentices, resorted to written agreements to make sure that their obligations were reciprocal or that financially substantial and/or long term commitments were honoured.…”
Get full text
Article -
13116
'n Eksegeties-teologiese interpretasie van Habakuk 3
Published 2003-12-01“…In the mean time believers must patiently await His intervention which will surely happen in due course. …”
Get full text
Article -
13117
A Guide to Tracking Physical Activity
Published 2016-08-01“…One proven strategy to make sure you reach your activity goal is to track your energy expenditure. …”
Get full text
Article -
13118
Frequent-pattern discovering algorithm for large-scale corpus
Published 2007-01-01“…A memory-based frequent-pattern discovering algorithm for large-scale corpus was presented.First,the origi-nal corpus was partitioned into several parts using appropriate dividing policy.Then each partition was processed inde-pendently to produce a temporary result,and the union of all temporary results is the final frequent-pattern set.The algo-rithm prunes a subtree once it is sure that none of the corresponding pattern will be frequent.Experiment shows that it takes no more than 1.6 gigabytes of memory to discover all patterns appearing more than 100 times for a 3.6 gigabytes news corpus,the average speed is 3.28 magabytes per second.…”
Get full text
Article -
13119
Nematode Management for Bedding Plants
Published 2014-02-01“… Florida is the “land of flowers.” Surely, one of the things that Florida is known for is the beauty of its vegetation. …”
Get full text
Article -
13120
Reliable heuristic mapping method for survivable virtual network
Published 2015-07-01“…For reliable virtual network mapping problem,virtual network survivability constraints are introduced to ensure that the rest of the mapped virtual network remains connected under a single node failure condition in the substrate network,which makes sure the completeness of the virtual network and continuity of services.In order to reduce cost of the substrate network,the reliable heuristic mapping problem is considered as an integer linear programming model and a reliable heuristic mapping method for survivable virtual network is proposed to solve the problem.The simulation results show that average usage of links is reduced and the success rate,average revenue of mapping,recovery success rate of virtual network are increased compared with the existing reliable mapping algorithms.…”
Get full text
Article