Showing 1,941 - 1,960 results of 4,194 for search 'SunCET~', query time: 2.43s Refine Results
  1. 1941

    Performance Development and Evaluation of Solar Air Collector with Novel Phase Change Material by V. Vedanarayanan, J. Dilli Srinivasan, K. Arulvendhan, P. Thirusenthil Kumaran, R. Selvakumar, T. Maridurai, M. Sudhakar, Sami Al Obaid, Saleh Alfarraj, M. M. Raj, Ishwarya Komalnu Raghavan

    Published 2022-01-01
    “…Because of the PCM’s better heat-storing capability, this system has a benefit over sensible storage systems in that it may be used after sunset.…”
    Get full text
    Article
  2. 1942

    Winter is (not) coming: Acoustic monitoring and temperature variation across important bat hibernacula by Nia Toshkova, Maksim Kolev, Stanimira Deleva, Tzvetan Simeonov, Vasil Popov

    Published 2025-01-01
    “…While bats were mostly active right after sunset following their usual circadian rhythm, some daytime activity was also observed, including emergence at temperatures as low as -8°C. …”
    Get full text
    Article
  3. 1943

    İslam ve Öteki: Erken Dönem Müslüman Toplumlarında Öteki İmgesi Üzerine Bir İnceleme by Cemal Özel

    Published 2021-12-01
    “…Bizans algısının temelini ilk zamanlarda Kuran ve sünnet kültürü oluştururken zamanla siyasi gelişmeler baskın hale gelmiştir. …”
    Get full text
    Article
  4. 1944

    İmâmiyye Şîası’nda Kırâatlerin Mezhebî Sâiklerle Kullanılması ve Yorumlanması: Tûsî-Tabersî Örneği by Süleyman Yıldız

    Published 2020-06-01
    “…Günümüzde Şiîlik denildiği zaman ilk akla gelen mezhep olan İmâmiyye Şîası, İslam dünyasında Ehl-i sünnet’ten sonraki en büyük grubu oluşturmaktadır. …”
    Get full text
    Article
  5. 1945

    Ebû Ca‘fer et-Tahâvî (ö. 321/933) ve Ebû Bekr er-Râzî el- Cessâs’ın (ö. 371/981) Ahkâmü’l-Kur’ân’larının Rivayet ve Re’y Kullanımları Açısından Karşılaştırılması... by Zeyneb Soyarslan

    Published 2024-06-01
    “…Rivayet konusu kapsamında müfessirlerin Kur’an’ı, Kur’an, sünnet, sahâbe/tabiîn sözleri, nüzûl sebepleri ve nâsih/mensûh ile tefsir etme yöntemleri incelenmiştir. …”
    Get full text
    Article
  6. 1946

    Fixed point iteration for asymptotically quasi-nonexpansive mappings in Banach spaces by Somyot Plubtieng, Rabian Wangkeeree

    Published 2005-01-01
    “…Suppose that C is a nonempty closed convex subset of a real uniformly convex Banach space X. …”
    Get full text
    Article
  7. 1947

    A weak ergodic theorem for infinite products of Lipschitzian mappings by Simeon Reich, Alexander J. Zaslavski

    Published 2003-01-01
    “…Let K be a bounded, closed, and convex subset of a Banach space. For a Lipschitzian self-mapping A of K, we denote by Lip(A) its Lipschitz constant. …”
    Get full text
    Article
  8. 1948
  9. 1949

    Bilateral Bulky Adrenal Plasmacytomas with Very Good Response to Daratumumab-Based Therapy by Fang-Yu Wang, Han-Kuang Hsieh, Tso-Fu Wang, Yi-Feng Wu

    Published 2023-04-01
    “…An optimal treatment strategy for this clinical subset has not yet been clarified. In this report, we demonstrate a patient with MM with the uncommon manifestation of plasmacytomas with a very high burden in the bilateral adrenal glands at diagnosis, which were treated successfully with daratumumab-based second-line therapy.…”
    Get full text
    Article
  10. 1950

    Resolving the Durand Conundrum by Lou Burnard

    Published 2017-09-01
    “…A very small set of additional elements would permit the ODD language to cut its ties with any existing schema language, and thus permit it to support exactly and only the subset or intersection of their facilities which makes sense in the TEI context. …”
    Get full text
    Article
  11. 1951

    A metric space associated with probability space by Keith F. Taylor, Xikui Wang

    Published 1993-01-01
    “…The questions of when S(∑) is compact or connected are awswered and the important subset consisting of all continuous sub-σ-algebras is shown to be closed. …”
    Get full text
    Article
  12. 1952

    Multiplicity of Quasilinear Schrödinger Equation by Xiaorong Luo, Anmin Mao, Xiangxiang Wang

    Published 2020-01-01
    “…When the pair of parameters belongs to a certain subset of ℝ2, we establish the existence of a nontrivial mountain pass-type solution and infinitely many negative energy solutions by using some new techniques and dual fountain theorem. …”
    Get full text
    Article
  13. 1953

    LNC points for m-convex sets by Marilyn Breen

    Published 1981-01-01
    “…Let S be closed, m-convex subset of Rd, S locally a full d-dimensional, with Q the corresponding set of lnc points of S. …”
    Get full text
    Article
  14. 1954

    ULUSLARARASI YÜKSEKÖĞRENİM TRENDLERİ BAĞLAMINDA İLETİŞİM EĞİTİMİNİ YENİDEN DÜŞÜNMEK by Nüket Ergeç

    Published 2014-03-01
    “…İletişim eğitiminin genel yapısının yükseköğrenim trendleri bağlamında incelendiği çalışmada, iletişim eğitiminin yükseköğrenimin güncel eğilimlerinin oldukça uzağında olduğu sonucuna ulaşılmıştır.…”
    Get full text
    Article
  15. 1955

    An Association Rule Mining Scheme Based on Bit Operation and Reverse Index by Yulei Huang, Xiaoxia Luo, Qing Lin

    Published 2015-11-01
    “…An improved Apriori algorithm for association rule mining called Apriori-BR was proposed,which was based on bit operation and reverse index.Specifically,the reverse index from frequent itemsets to transactions was constructed firstly by scanning twice of database,and the reverse index was grouped by the length of transactions.Then in the mining process,bit operation was adopted to accelerate subset detection together with the dynamical elimination of invalid low-dimensional transactions.The numerical results show that the Apriori-BR proposed can substantially improve mining efficiency when compared with the conventional Apriori algorithm and the improved ones in the literature.…”
    Get full text
    Article
  16. 1956

    Research on cloud storage systems supporting secure sharing by Yan SONG, Zhen HAN, Jian-jun LI, Lei HAN

    Published 2017-10-01
    “…A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption,proxy encryption with symmetric encryption,could integrate access control,efficient search with encryption well together.The scheme archived conjunctive-keyword non-field subset search by using bilinear mapping and polynomial equation.The scheme reduced the cost of decryption by outsourcing most of the decryption operations from the terminal to the cloud.At last,the performance was analyzed and an experiment was made for verification.…”
    Get full text
    Article
  17. 1957

    Biomarkers in scleroderma: Current status by Latika Gupta, Sanat Phatak, Sukesh Edavalath

    Published 2017-01-01
    “…Many patients, especially those with the limited subset of the disease, have an indolent course without clear-cut inflammatory manifestations. …”
    Get full text
    Article
  18. 1958

    A Study on -Quasi-Cauchy Sequences by Hüseyin Çakalli, Huseyin Kaplan

    Published 2013-01-01
    “…In this paper, we prove that the uniform limit of -ward continuous functions is -ward continuous, and the set of all -ward continuous functions is a closed subset of the set of all continuous functions. We also obtain that a real function defined on an interval is uniformly continuous if and only if (()) is -quasi-Cauchy whenever () is a quasi-Cauchy sequence of points in .…”
    Get full text
    Article
  19. 1959

    Uniformly Primal Submodule over Noncommutative Ring by Lamis J. M. Abulebda

    Published 2020-01-01
    “…A submodule N of M is called a uniformly primal submodule provided that the subset B of R is uniformly not right prime to N, if there exists an element s∈M−N with sRB⊆N.The set adjN=r∈R|mRr⊆N for some m∈M is uniformly not prime to N.This paper is concerned with the properties of uniformly primal submodules. …”
    Get full text
    Article
  20. 1960