Showing 16,621 - 16,640 results of 22,124 for search 'stOrk~', query time: 4.53s Refine Results
  1. 16621

    A Secure Application for Information Sharing i n Organizations: A Case Study of Kabale District Local Government by Ivan, Niyonzima, Godfrey, Omoda Onyait

    Published 2019
    “…The application was tested and validated by a range of stakeholders and it was found secure. For the future work, a survey will be carried out in a range of organizations in order to develop an improved applic ation for information sharing.…”
    Get full text
    Article
  2. 16622

    The Purpose of Keeping Records towards the Development of Government Hospitals. A Case Study of Kabale Referral Hospital in Kabale District by Pamela, Naturinda

    Published 2019
    “…The study also discovered that in order to overcome the above challenges, there should be use of modern technology, updating records, use of proper storage trained staff. The study recommends that Government should facilitate the Hospital, its requirements such as computers, use of modern technology, updating records, use of proper storage and trained staff to improve the services of the Hospital. …”
    Get full text
    Thesis
  3. 16623

    Influence of core window height on thermal characteristics of dry-type transformers by Kamran Dawood, Seda Kul

    Published 2025-02-01
    “…The objective of this work is to analyze the influence of core window dimensions on the thermal efficiency of power transformers. …”
    Get full text
    Article
  4. 16624
  5. 16625

    Analisis Klasifikasi Sentimen Ulasan pada E-Commerce Shopee Berbasis Word Cloud dengan Metode Naive Bayes dan K-Nearest Neighbor by Josua Josen Alexander Limbong, Irwan Sembiring, kristoko dwi hartomo

    Published 2022-02-01
    “…Hasilnya setelah menggunakan metode Naive Bayes memperoleh hasil nilai accuracy 0,914, precision 0,915, recall 0,914 dan F1 score 0,916. Sedangkan metode KNN memperoleh nilai accuracy 0,928,  precision 0,929,  recall 0,928, dan F1 score 0,926. …”
    Get full text
    Article
  6. 16626

    Development characteristics and river blocking outburst analysis of Shadong landslide in the upper reaches of Jinsha River by Shunxiang ZHENG, Jun WANG, Yong YAN, Wen LIU, Heng ZHAO, Junxiang YANG, Xiongan FAN, Yi ZHANG, Meng WANG, Tianbin YU

    Published 2024-11-01
    “…The maximum flood flow could reach 11315 m3/s, with a maximum flood peak height of approximately 31 m at the Lava Power Station. In the event of both storm and earthquake conditions, II-1 and II-2 zone are unstable at the same time, resulting in the height of the barrier dam of approximately 153 m, with a barrier lake capacity of approximately 5.66×108 m3. …”
    Get full text
    Article
  7. 16627
  8. 16628
  9. 16629

    Formation of forest mensuration indicators of Pseudotsuga menziesii (Mirb.) Franco in artificial plantations of the western region of Ukraine by Iurii Debryniuk, Stepan Myklush, Yuriy Myklush

    Published 2024-10-01
    “…Furthermore, the correlation between Pseudotsuga menziesii presence and the stand growing stock within the studied age range demonstrates a notably high value (> 0.91) applying both to the plantations as a whole and specifically to the proportion of growing stock of Douglas fir within them. …”
    Get full text
    Article
  10. 16630

    Acid-Unlocked Two-Layer Ca-Loaded Nanoplatform to Interfere With Mitochondria for Synergistic Tumor Therapy by Zheng Y, Williams GR, Hu R, Tong S, Xu J, Wang T, Zhang Y, Wu J, Li F, Cai Y, Zhu LM

    Published 2025-02-01
    “…CUR can promote the release of Ca2+ from the endoplasmic reticulum to the cytoplasm, inhibit the outflow of Ca2+, and accumulates a large amount of Ca2+ intracellularly together with exogenous Ca2+ (calcium storms). The powerful calcium storm that causes mitochondrial dysfunction. …”
    Get full text
    Article
  11. 16631

    Failure Assessment Methodologies for Pressure-Retaining Components under Severe Accident Loading by J. Arndt, H. Grebner, J. Sievers

    Published 2012-01-01
    “…The second method is to perform thermohydraulic and structure mechanic calculations for the accident scenario under consideration using complex calculation models. The paper shortly describes both assessment procedures. Validation of the ASTOR method concerning a large-scale test on a pipe section with geometric properties similar to a reactor coolant line is presented as well as severe accident scenarios investigated with both methods.…”
    Get full text
    Article
  12. 16632
  13. 16633

    TheFundamentals of Digital Photography / by Daly, Tim, 1964-

    Published 2014
    Table of Contents: “…Chapter 1: How equipment works: Digital SLR; Compact cameras; Medium format camera; Lens essentials; Computers and monitors; Adobe Photoshop; Image editing software: Adobe Lightroom; Project Chapter 2: Shooting skills: Camera quality settings; File formats; Aperture; Shutter speeds and movement; Exposure and how to measure it properly; Camera metering modes; Camera program modes; The lens and focussing; Depth of field; Viewpoint; Composing your image; Seeing the world in monochrome; Project Chapter 3: Themes and their workflows: Basic observational documentary: Urban texture; Culturally aware documentary: Out of season; Candid/street photography: People on the street; Eco/political study: The threatened landscape; Photo essay narrative: A day in the life; Location portrait: Public/private; Studio portrait: Alter-ego; Collaboration with others: Constructed reality; Current issue story: Signs of the times; 'Late' photography: The aftermath; Staging/performance: A re-enactment; Developing own work: A personal project Chapter 4: Project development: Researching your project; Planning and prep; Testing and review; Shaping your project; Project Chapter 5: Treatment: Essential software skills; Creative emphasis; Project: Sample files to test edit Chapter 6: Output and finishing: Desktop printing; Remote printing services; Onscreen use; Project Bibliography Glossary Index Acknowledgements and picture credits Working with ethics…”
    View in OPAC
    Book
  14. 16634
  15. 16635

    Masquerade Syndrome of Multicentre Primary Central Nervous System Lymphoma by Silvana Guerriero, Ermete Giancipoli, Lorenza Ciracì, Giuseppe Ingravallo, Marcella Prete, Elisabetta Di Leo, Antonietta Cimmino, Nicola Cardascia

    Published 2011-01-01
    “…To confirm this rumor, we report the sad story of a surgeon with bilateral vitreitis and glaucoma unresponsive to traditional therapies. …”
    Get full text
    Article
  16. 16636

    Research on Evaluation Index System of Emergency Scheduling Scheme for Reservoir with Loss of Regulation Capacity and Its Application in Xijiang River by REN Mengzhi, LIU Dengfeng, YANG Yuanyuan, LIU Dong, HUANG Qiang, WAN Xin

    Published 2020-01-01
    “…This paper establishes an evaluation index system for extreme events such as completefailure of reservoir to store or discharge water, with the criteria layer including reservoirsafety, water supply, power generation and ecology and the index layer including the durationratio of reservoir over-check water level, ratio of maximum change range of reservoir water level,ratio of water supply guarantee, vulnerability of water supply, maximum water shortage rate,minimum output ratio, loss of power generation benefits, ratio of time to meet ecological flow andthe satisfaction degree of ecological flow; assigns the weight to each index by analytic hierarchyprocess (AHP); and evaluates the different schemes for reservoirs in Xijiang River Basin underfour loss of regulation capacity scenarios with the fuzzy optimization model, non-negative matrixfactorization algorithm and AGA-based projection pursuit clustering model. …”
    Get full text
    Article
  17. 16637

    Geomagnetic Pulsations Driving Geomagnetically Induced Currents by M. J. Heyns, S. I. Lotz, C. T. Gaunt

    Published 2021-02-01
    “…To a lesser extent fluctuations from regular oscillations of the geomagnetic field, or geomagnetic pulsations, have also been identified as possible drivers of GICs. In this work we show that these low‐frequency pulsations are directly observed in measured GIC data from power networks. …”
    Get full text
    Article
  18. 16638

    Empowering IoT: leveraging data sensor communication with LoRAWAN in diverse environments by Noprianto Noprianto, Habibie Ed Dien, Septian Enggar Sukmana, Fayyadh Al Baity, Mustika Mentari

    Published 2025-01-01
    “…This research tests LoRAWAN’s performance for sensor data communication both inside multi-story buildings (up to 8 storeys) and outside. The results show successful data transmission in both scenarios, including up to 2.60 km with a 35 dBi outdoor antenna. …”
    Get full text
    Article
  19. 16639

    Novella The Earthquake in Chile by Heinrich von Kleist in Serbian translations by Pasula Milica B.

    Published 2024-01-01
    “…His novella, The Earthquake in Chile, stands out in a row of controversial literary works which had shocked his contemporaries and was met with waves of disapprovals and censorships. …”
    Get full text
    Article
  20. 16640

    A single flow detection enabled method for DDoS attacks in IoT based on traffic feature reconstruction and mapping by Lixia XIE, Bingdi YUAN, Hongyu YANG, Ze HU, Xiang CHENG, Liang ZHANG

    Published 2024-01-01
    “…To address the slow response time of existing detection modules to Internet of things (IoT) distributed denial of service (DDoS) attacks, their low feature differentiation, and poor detection performance, a single flow detection enabled method based on traffic feature reconstruction and mapping (SFDTFRM) was proposed.Firstly, SFDTFRM employed a queue to store previously arrived flow based on the first in, first out rule.Secondly, to address the issue of similarity between normal communication traffic of IoT devices and DDoS attack traffic, a multidimensional reconstruction neural network model more lightweight compared to the baseline model and a function mapping method were proposed.The modified model loss function was utilized to reconstruct the quantitative feature matrix of the queue according to the corresponding index, and transformed into a mapping feature matrix through the function mapping method, enhancing the differences between different types of traffic, including normal communication traffic of IoT devices and DDoS attack traffic.Finally, the frequency information was extracted using a text convolutional network and information entropy calculation and the machine learning classifier was employed for DDoS attack traffic detection.The experimental results on two benchmark datasets show that SFDTFRM can effectively detect different DDoS attacks, and the average metrics value of SFDTFRM is a maximum of 12.01% higher than other existing methods.…”
    Get full text
    Article