-
121
SOLETE, a 15-month long holistic dataset including: Meteorology, co-located wind and solar PV power from Denmark with various resolutions
Published 2022-06-01“…The dataset has been recorded in SYSLAB, a laboratory for distributed energy resources located in Denmark. A meteorological station, an 11 kW wind turbine and a 10 kW PV array have been used to record measurements, transferred to a central server. …”
Get full text
Article -
122
Humanitarianism and Unequal Exchange
Published 2017-08-01“…The humanitarian “gift” therefore helped depoliticize critical issues of land and resources, location and livelihood, which prior to the tsunami were subjects of long-standing political conflicts between local fisher populations and the state. …”
Get full text
Article -
123
A Honeybee-Inspired Framework for a Smart City Free of Internet Scams
Published 2023-04-01“…On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. …”
Get full text
Article -
124
MINERAL RESOURCES IN NORTHERN REGIONS IN THE CONTEXT OF RUSSIA’S INDUSTRIAL TRANSFORMATION
Published 2023-09-01“…The study explores the relationship between the mineral resources located in the Russian North and the general trends in Russia’s economic development in the context of the evolving geopolitical landscape. …”
Article -
125
Opportunistic and On-Demand Network Coding-Based Solutions for LPWAN Forwarding
Published 2020-10-01“…Moreover, LPWAN trade-off the data rate to achieve longer coverage, preventing other end-devices from using the time resource. Locating other gateways is uneconomical as it requires infrastructure, such as the internet and a power connection. …”
Get full text
Article -
126
Exploration of human activity fragmentation in cyber and physical spaces using massive mobile phone data
Published 2024-04-01“…In this work, massive Call Detail Records (CDR) data and Uniform Resource Locator (URL) data from millions of mobile phone users are used to extract the activity fragmentation in both cyber and physical spaces. …”
Get full text
Article -
127
Direct conversion of methane to methanol by electrochemical methods
Published 2022-12-01“…A convenient method for methane (CH4) direct conversion to methanol (CH3OH) is of great significance to use methane-rich resources, especially clathrates and stranded shale gas resources located in remote regions. Theoretically, the activation of CH4 and the selectivity to the CH3OH product are challenging due to the extreme stability of CH4 and relatively high reactivity of CH3OH. …”
Get full text
Article -
128
Spatial Habitat Structure Assembles Willow-Dependent Communities across the Primary Successional Watersheds of Mount St. Helens, USA
Published 2023-02-01“…This is critical for management as we show that the maintenance of a heterogeneous mixture of landscape connectivity and resource locations can facilitate metacommunity dynamics to promote ecosystem function and mitigate the influences of invasive species.…”
Get full text
Article -
129
An IOTA-Based Service Discovery Framework for Fog Computing
Published 2021-04-01“…With the rise in fog computing, users are no longer restricted to only accessing resources located in central and distant clouds and can request services from neighboring fog nodes distributed over networks. …”
Get full text
Article -
130
CLINICAL DECISION SUPPORT SYSTEM WITH PROCESSING OF MULTIMODAL MEDICAL DATA FOR RADIOLOGIST EFFICIENCY IMPROVEMENT PRACTICE
Published 2020-12-01“…The proposed system is located in the ITMO domain at the uniform resource locator address: http://mcp.itmo.ru and is used in the practice of the Almazov National Medical Research Centre of the Ministry of Health of Russia, and the “City Children’s Infectious Disease Clinical Hospital” Healthcare Institution in Minsk. …”
Get full text
Article -
131
BERT-Based Approaches to Identifying Malicious URLs
Published 2023-10-01“…Malicious uniform resource locators (URLs) are prevalent in cyberattacks, particularly in phishing attempts aimed at stealing sensitive information or distributing malware. …”
Get full text
Article -
132
Honey Bee Location- and Time-Linked Memory Use in Novel Foraging Situations: Floral Color Dependency
Published 2014-02-01“…However, memory is of decreasing value with changes brought about by moving to novel resource locations or activity at different times of the day. …”
Get full text
Article -
133
Internet browser bookmark synchronization tool / Muhd Baharul Nashim Ibrahim
Published 2007“…The tool is function to synchronize user bookmark and more specifically synchronize the Uniform Resource Locator (URL) in the bookmark file. Currently, there are several bookmark synchronizer tool available nowadays. …”
Get full text
Thesis -
134
A Honeybee-Inspired Framework for a Smart City Free of Internet Scams
Published 2023“…On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. …”
Get full text
Article -
135
A Honeybee-Inspired Framework for a Smart City Free of Internet Scams
Published 2023“…On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. …”
Get full text
Get full text
Article -
136
A Honeybee-Inspired Framework for a Smart City Free of Internet Scams
Published 2023“…On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. …”
Get full text
Article -
137
A Honeybee-Inspired Framework for a Smart City Free of Internet Scams
Published 2023“…On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. …”
Get full text
Article -
138
Clustering web users for reductions the internet traffic load and users access cost based on K-means algorithm
Published 2018“…Based on the web structure, each Uniform Resource Locator (URL) in the web log data is parsed into tokens which are uniquely identified for URLs classification. …”
Article -
139
A Combined RNA Preservation and Extraction Protocol for Gene Expression Studies in Cacao Beans
Published 2020-06-01“…Furthermore, cacao beans are mostly found at remote and under-resourced locations, which pressures the outsourcing of such analysis and thereby demands RNA-stable preservation and transportation of cacao beans. …”
Get full text
Article -
140
Detecting Web-Based Attacks with SHAP and Tree Ensemble Machine Learning Methods
Published 2021-12-01“…Attacks using Uniform Resource Locators (URLs) and their JavaScript (JS) code content to perpetrate malicious activities on the Internet are rampant and continuously evolving. …”
Get full text
Article