Showing 121 - 140 results of 241 for search '"resource location"', query time: 0.42s Refine Results
  1. 121

    SOLETE, a 15-month long holistic dataset including: Meteorology, co-located wind and solar PV power from Denmark with various resolutions by Daniel Vazquez Pombo, Oliver Gehrke, Henrik W. Bindner

    Published 2022-06-01
    “…The dataset has been recorded in SYSLAB, a laboratory for distributed energy resources located in Denmark. A meteorological station, an 11 kW wind turbine and a 10 kW PV array have been used to record measurements, transferred to a central server. …”
    Get full text
    Article
  2. 122

    Humanitarianism and Unequal Exchange by Raja Swamy

    Published 2017-08-01
    “…The humanitarian “gift” therefore helped depoliticize critical issues of land and resources, location and livelihood, which prior to the tsunami were subjects of long-standing political conflicts between local fisher populations and the state. …”
    Get full text
    Article
  3. 123

    A Honeybee-Inspired Framework for a Smart City Free of Internet Scams by Abdulghani Ali Ahmed, Ali Al-Bayatti, Mubarak Saif, Waheb A. Jabbar, Taha H. Rassem

    Published 2023-04-01
    “…On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. …”
    Get full text
    Article
  4. 124

    MINERAL RESOURCES IN NORTHERN REGIONS IN THE CONTEXT OF RUSSIA’S INDUSTRIAL TRANSFORMATION by Vitaly N. Lazhentsev

    Published 2023-09-01
    “…The study explores the relationship between the mineral resources located in the Russian North and the general trends in Russia’s economic development in the context of the evolving geopolitical landscape. …”
    Article
  5. 125

    Opportunistic and On-Demand Network Coding-Based Solutions for LPWAN Forwarding by Dion Tanjung, Seunggyu Byeon, Junhwan Huh, Dong Hyun Kim, Jong Deok Kim

    Published 2020-10-01
    “…Moreover, LPWAN trade-off the data rate to achieve longer coverage, preventing other end-devices from using the time resource. Locating other gateways is uneconomical as it requires infrastructure, such as the internet and a power connection. …”
    Get full text
    Article
  6. 126

    Exploration of human activity fragmentation in cyber and physical spaces using massive mobile phone data by Minglei Liao, Mei-Po Kwan, Xintao Liu

    Published 2024-04-01
    “…In this work, massive Call Detail Records (CDR) data and Uniform Resource Locator (URL) data from millions of mobile phone users are used to extract the activity fragmentation in both cyber and physical spaces. …”
    Get full text
    Article
  7. 127

    Direct conversion of methane to methanol by electrochemical methods by Haomin Jiang, Luting Zhang, Zhiwei Han, Yang Tang, Yanzhi Sun, Pingyu Wan, Yongmei Chen, Morris D. Argyle, Maohong Fan

    Published 2022-12-01
    “…A convenient method for methane (CH4) direct conversion to methanol (CH3OH) is of great significance to use methane-rich resources, especially clathrates and stranded shale gas resources located in remote regions. Theoretically, the activation of CH4 and the selectivity to the CH3OH product are challenging due to the extreme stability of CH4 and relatively high reactivity of CH3OH. …”
    Get full text
    Article
  8. 128

    Spatial Habitat Structure Assembles Willow-Dependent Communities across the Primary Successional Watersheds of Mount St. Helens, USA by Charles D. Minsavage-Davis, Iris J. Garthwaite, Marisa D. Fisher, Addison Leigh, Joy M. Ramstack Hobbs, Shannon M. Claeson, Gina M. Wimp, Carri J. LeRoy

    Published 2023-02-01
    “…This is critical for management as we show that the maintenance of a heterogeneous mixture of landscape connectivity and resource locations can facilitate metacommunity dynamics to promote ecosystem function and mitigate the influences of invasive species.…”
    Get full text
    Article
  9. 129

    An IOTA-Based Service Discovery Framework for Fog Computing by Tsung-Yi Tang, Li-Yuan Hou, Tyng-Yeu Liang

    Published 2021-04-01
    “…With the rise in fog computing, users are no longer restricted to only accessing resources located in central and distant clouds and can request services from neighboring fog nodes distributed over networks. …”
    Get full text
    Article
  10. 130

    CLINICAL DECISION SUPPORT SYSTEM WITH PROCESSING OF MULTIMODAL MEDICAL DATA FOR RADIOLOGIST EFFICIENCY IMPROVEMENT PRACTICE by Artem A. Lobantsev

    Published 2020-12-01
    “…The proposed system is located in the ITMO domain at the uniform resource locator address: http://mcp.itmo.ru and is used in the practice of the Almazov National Medical Research Centre of the Ministry of Health of Russia, and the “City Children’s Infectious Disease Clinical Hospital” Healthcare Institution in Minsk. …”
    Get full text
    Article
  11. 131

    BERT-Based Approaches to Identifying Malicious URLs by Ming-Yang Su, Kuan-Lin Su

    Published 2023-10-01
    “…Malicious uniform resource locators (URLs) are prevalent in cyberattacks, particularly in phishing attempts aimed at stealing sensitive information or distributing malware. …”
    Get full text
    Article
  12. 132

    Honey Bee Location- and Time-Linked Memory Use in Novel Foraging Situations: Floral Color Dependency by Marisol Amaya-Márquez, Peggy S. M. Hill, Charles I. Abramson, Harrington Wells

    Published 2014-02-01
    “…However, memory is of decreasing value with changes brought about by moving to novel resource locations or activity at different times of the day. …”
    Get full text
    Article
  13. 133

    Internet browser bookmark synchronization tool / Muhd Baharul Nashim Ibrahim by Ibrahim, Muhd Baharul Nashim

    Published 2007
    “…The tool is function to synchronize user bookmark and more specifically synchronize the Uniform Resource Locator (URL) in the bookmark file. Currently, there are several bookmark synchronizer tool available nowadays. …”
    Get full text
    Thesis
  14. 134

    A Honeybee-Inspired Framework for a Smart City Free of Internet Scams by Abdulghani Ali Ahmed, Abdulghani Ali Ahmed, Ali Al-Bayatti, Ali Al-Bayatti, Mubarak Saif, Mubarak Saif, Waheb A. Jabbar, Waheb A. Jabbar, Taha H. Rassem, Taha H. Rassem

    Published 2023
    “…On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. …”
    Get full text
    Article
  15. 135

    A Honeybee-Inspired Framework for a Smart City Free of Internet Scams by Ali Ahmed, Abdulghani, Al-Bayatti, Ali, Saif, Mubarak, A. Jabbar, Waheb, H. Rassem, Taha

    Published 2023
    “…On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. …”
    Get full text
    Get full text
    Article
  16. 136

    A Honeybee-Inspired Framework for a Smart City Free of Internet Scams by Ahmed, Abdulghani Ali, Al-Bayatti, Ali, Saif, Mubarak, A. Jabbar, Waheb, H. Rassem, Taha

    Published 2023
    “…On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. …”
    Get full text
    Article
  17. 137

    A Honeybee-Inspired Framework for a Smart City Free of Internet Scams by Abdulghani Ali Ahmed, Abdulghani Ali Ahmed, Ali Al-Bayatti, Ali Al-Bayatti, Mubarak Saif, Mubarak Saif, Waheb A. Jabbar, Waheb A. Jabbar, Taha H. Rassem, Taha H. Rassem

    Published 2023
    “…On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. …”
    Get full text
    Article
  18. 138

    Clustering web users for reductions the internet traffic load and users access cost based on K-means algorithm by Nasser, Maged, Salim, Naomie, Hamza, Hentabli, Saeed, Faisal

    Published 2018
    “…Based on the web structure, each Uniform Resource Locator (URL) in the web log data is parsed into tokens which are uniquely identified for URLs classification. …”
    Article
  19. 139

    A Combined RNA Preservation and Extraction Protocol for Gene Expression Studies in Cacao Beans by Jocelyn De Wever, Jocelyn De Wever, Dieter Tulkens, Dieter Tulkens, Jan Verwaeren, Helena Everaert, Helena Everaert, Hayley Rottiers, Hayley Rottiers, Koen Dewettinck, Steve Lefever, Steve Lefever, Steve Lefever, Kathy Messens

    Published 2020-06-01
    “…Furthermore, cacao beans are mostly found at remote and under-resourced locations, which pressures the outsourcing of such analysis and thereby demands RNA-stable preservation and transportation of cacao beans. …”
    Get full text
    Article
  20. 140

    Detecting Web-Based Attacks with SHAP and Tree Ensemble Machine Learning Methods by Samuel Ndichu, Sangwook Kim, Seiichi Ozawa, Tao Ban, Takeshi Takahashi, Daisuke Inoue

    Published 2021-12-01
    “…Attacks using Uniform Resource Locators (URLs) and their JavaScript (JS) code content to perpetrate malicious activities on the Internet are rampant and continuously evolving. …”
    Get full text
    Article