Suggested Topics within your search.
Suggested Topics within your search.
- History 12
- Sports 6
- Anesthesia 5
- Economic conditions 5
- Torts 5
- Management 4
- Social service 4
- Sociological aspects 4
- Sports medicine 4
- Income distribution 3
- Journalism 3
- Moral and ethical aspects 3
- Orthopedics 3
- Public administration 3
- Research 3
- Sex role 3
- Study and teaching 3
- Women 3
- methods 3
- Anesthetics 2
- Authorship 2
- Automobiles 2
- Children 2
- Citizen participation 2
- Curricula 2
- Curriculum planning 2
- Digital techniques 2
- Domestic relations 2
- Economic policy 2
- Education 2
-
16621
A Secure Application for Information Sharing i n Organizations: A Case Study of Kabale District Local Government
Published 2019“…The application was tested and validated by a range of stakeholders and it was found secure. For the future work, a survey will be carried out in a range of organizations in order to develop an improved applic ation for information sharing.…”
Get full text
Article -
16622
The Purpose of Keeping Records towards the Development of Government Hospitals. A Case Study of Kabale Referral Hospital in Kabale District
Published 2019“…The study also discovered that in order to overcome the above challenges, there should be use of modern technology, updating records, use of proper storage trained staff. The study recommends that Government should facilitate the Hospital, its requirements such as computers, use of modern technology, updating records, use of proper storage and trained staff to improve the services of the Hospital. …”
Get full text
Thesis -
16623
Influence of core window height on thermal characteristics of dry-type transformers
Published 2025-02-01“…The objective of this work is to analyze the influence of core window dimensions on the thermal efficiency of power transformers. …”
Get full text
Article -
16624
-
16625
Analisis Klasifikasi Sentimen Ulasan pada E-Commerce Shopee Berbasis Word Cloud dengan Metode Naive Bayes dan K-Nearest Neighbor
Published 2022-02-01“…Hasilnya setelah menggunakan metode Naive Bayes memperoleh hasil nilai accuracy 0,914, precision 0,915, recall 0,914 dan F1 score 0,916. Sedangkan metode KNN memperoleh nilai accuracy 0,928, precision 0,929, recall 0,928, dan F1 score 0,926. …”
Get full text
Article -
16626
Development characteristics and river blocking outburst analysis of Shadong landslide in the upper reaches of Jinsha River
Published 2024-11-01“…The maximum flood flow could reach 11315 m3/s, with a maximum flood peak height of approximately 31 m at the Lava Power Station. In the event of both storm and earthquake conditions, II-1 and II-2 zone are unstable at the same time, resulting in the height of the barrier dam of approximately 153 m, with a barrier lake capacity of approximately 5.66×108 m3. …”
Get full text
Article -
16627
Economic-productive analysis of a mixed cattle-bubaline model mixed model in the Northern region of Corrientes Province in Argentina
Published 2023-11-01“…In contrast, the cattle activity yielded 48 kg/ha of meat and 23% stock efficiency, $5,473 gross income, and 3% profitability. …”
Get full text
Article -
16628
Infectivity in full-term placenta of Zika viruses with different lipid profiles
Published 2025-02-01“…We found that the two viral stocks displayed identical consensus sequences with homogeneous quasispecies composition. …”
Get full text
Article -
16629
Formation of forest mensuration indicators of Pseudotsuga menziesii (Mirb.) Franco in artificial plantations of the western region of Ukraine
Published 2024-10-01“…Furthermore, the correlation between Pseudotsuga menziesii presence and the stand growing stock within the studied age range demonstrates a notably high value (> 0.91) applying both to the plantations as a whole and specifically to the proportion of growing stock of Douglas fir within them. …”
Get full text
Article -
16630
Acid-Unlocked Two-Layer Ca-Loaded Nanoplatform to Interfere With Mitochondria for Synergistic Tumor Therapy
Published 2025-02-01“…CUR can promote the release of Ca2+ from the endoplasmic reticulum to the cytoplasm, inhibit the outflow of Ca2+, and accumulates a large amount of Ca2+ intracellularly together with exogenous Ca2+ (calcium storms). The powerful calcium storm that causes mitochondrial dysfunction. …”
Get full text
Article -
16631
Failure Assessment Methodologies for Pressure-Retaining Components under Severe Accident Loading
Published 2012-01-01“…The second method is to perform thermohydraulic and structure mechanic calculations for the accident scenario under consideration using complex calculation models. The paper shortly describes both assessment procedures. Validation of the ASTOR method concerning a large-scale test on a pipe section with geometric properties similar to a reactor coolant line is presented as well as severe accident scenarios investigated with both methods.…”
Get full text
Article -
16632
-
16633
TheFundamentals of Digital Photography /
Published 2014Table of Contents: “…Chapter 1: How equipment works: Digital SLR; Compact cameras; Medium format camera; Lens essentials; Computers and monitors; Adobe Photoshop; Image editing software: Adobe Lightroom; Project Chapter 2: Shooting skills: Camera quality settings; File formats; Aperture; Shutter speeds and movement; Exposure and how to measure it properly; Camera metering modes; Camera program modes; The lens and focussing; Depth of field; Viewpoint; Composing your image; Seeing the world in monochrome; Project Chapter 3: Themes and their workflows: Basic observational documentary: Urban texture; Culturally aware documentary: Out of season; Candid/street photography: People on the street; Eco/political study: The threatened landscape; Photo essay narrative: A day in the life; Location portrait: Public/private; Studio portrait: Alter-ego; Collaboration with others: Constructed reality; Current issue story: Signs of the times; 'Late' photography: The aftermath; Staging/performance: A re-enactment; Developing own work: A personal project Chapter 4: Project development: Researching your project; Planning and prep; Testing and review; Shaping your project; Project Chapter 5: Treatment: Essential software skills; Creative emphasis; Project: Sample files to test edit Chapter 6: Output and finishing: Desktop printing; Remote printing services; Onscreen use; Project Bibliography Glossary Index Acknowledgements and picture credits Working with ethics…”
View in OPAC
Book -
16634
-
16635
Masquerade Syndrome of Multicentre Primary Central Nervous System Lymphoma
Published 2011-01-01“…To confirm this rumor, we report the sad story of a surgeon with bilateral vitreitis and glaucoma unresponsive to traditional therapies. …”
Get full text
Article -
16636
Research on Evaluation Index System of Emergency Scheduling Scheme for Reservoir with Loss of Regulation Capacity and Its Application in Xijiang River
Published 2020-01-01“…This paper establishes an evaluation index system for extreme events such as completefailure of reservoir to store or discharge water, with the criteria layer including reservoirsafety, water supply, power generation and ecology and the index layer including the durationratio of reservoir over-check water level, ratio of maximum change range of reservoir water level,ratio of water supply guarantee, vulnerability of water supply, maximum water shortage rate,minimum output ratio, loss of power generation benefits, ratio of time to meet ecological flow andthe satisfaction degree of ecological flow; assigns the weight to each index by analytic hierarchyprocess (AHP); and evaluates the different schemes for reservoirs in Xijiang River Basin underfour loss of regulation capacity scenarios with the fuzzy optimization model, non-negative matrixfactorization algorithm and AGA-based projection pursuit clustering model. …”
Get full text
Article -
16637
Geomagnetic Pulsations Driving Geomagnetically Induced Currents
Published 2021-02-01“…To a lesser extent fluctuations from regular oscillations of the geomagnetic field, or geomagnetic pulsations, have also been identified as possible drivers of GICs. In this work we show that these low‐frequency pulsations are directly observed in measured GIC data from power networks. …”
Get full text
Article -
16638
Empowering IoT: leveraging data sensor communication with LoRAWAN in diverse environments
Published 2025-01-01“…This research tests LoRAWAN’s performance for sensor data communication both inside multi-story buildings (up to 8 storeys) and outside. The results show successful data transmission in both scenarios, including up to 2.60 km with a 35 dBi outdoor antenna. …”
Get full text
Article -
16639
Novella The Earthquake in Chile by Heinrich von Kleist in Serbian translations
Published 2024-01-01“…His novella, The Earthquake in Chile, stands out in a row of controversial literary works which had shocked his contemporaries and was met with waves of disapprovals and censorships. …”
Get full text
Article -
16640
A single flow detection enabled method for DDoS attacks in IoT based on traffic feature reconstruction and mapping
Published 2024-01-01“…To address the slow response time of existing detection modules to Internet of things (IoT) distributed denial of service (DDoS) attacks, their low feature differentiation, and poor detection performance, a single flow detection enabled method based on traffic feature reconstruction and mapping (SFDTFRM) was proposed.Firstly, SFDTFRM employed a queue to store previously arrived flow based on the first in, first out rule.Secondly, to address the issue of similarity between normal communication traffic of IoT devices and DDoS attack traffic, a multidimensional reconstruction neural network model more lightweight compared to the baseline model and a function mapping method were proposed.The modified model loss function was utilized to reconstruct the quantitative feature matrix of the queue according to the corresponding index, and transformed into a mapping feature matrix through the function mapping method, enhancing the differences between different types of traffic, including normal communication traffic of IoT devices and DDoS attack traffic.Finally, the frequency information was extracted using a text convolutional network and information entropy calculation and the machine learning classifier was employed for DDoS attack traffic detection.The experimental results on two benchmark datasets show that SFDTFRM can effectively detect different DDoS attacks, and the average metrics value of SFDTFRM is a maximum of 12.01% higher than other existing methods.…”
Get full text
Article