Auswahl der wissenschaftlichen Literatur zum Thema „Metric system, 1898“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Metric system, 1898" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Metric system, 1898"

1

Moraes, Cicero, Francesco Maria Galassi, Luca Sineo, Jiří Šindelář, Elena Varotto, Joanna Mietlińska-Sauter, Nathalie Antunes-Ferreira, Michael E. Habicht und Thiago Beaini. „The anatomical bases of the 3D digital facial approximation of the Zlatý kůň 1 woman (ca. 43,000 BP)“. Anthropological Review 87, Nr. 2 (10.07.2024): 85–97. http://dx.doi.org/10.18778/1898-6773.87.2.04.

Der volle Inhalt der Quelle
Annotation:
In 1950 on Mount Zlatý kůň (‘Golden Horse’) in modern-day Czech Republic a system of caves was discovered. During many years of research in this area, human and animal osteological remains have been excavated, among which the most interesting ones were nine fragments of a female skull, now dated to ca. 43,000 yrs BP which are one of the earliest known anatomically modern humans in Eurasia. The aim of this research was to use purely digital techniques to: (1) to reconstruct the skull based on the 3D data of preserved fragments, (2) to approximate the probable appearance of the female it belonged to, and (3) to analyze the calculated shape of the reconstructed mandible and volume of the neurocranium in the context of similarities and differences with other representatives of the genus Homo. Computer techniques used in this research constitute a new, original approach to the problem of 3D analyses and may be useful primarily in bioarchaeological sciences, where metric analyses of the most valuable bone artifacts are often severely limited due to the incompleteness of the material available for research. The digital techniques presented here may also contribute significantly to the field of surgery, with the possibility of being adapted for applications in cranial prosthetics and post-traumatic reconstructive surgery.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Martinez, Norberto, Alejandra Tabares und John F. Franco. „Generation of Alternative Battery Allocation Proposals in Distribution Systems by the Optimization of Different Economic Metrics within a Mathematical Model“. Energies 14, Nr. 6 (19.03.2021): 1726. http://dx.doi.org/10.3390/en14061726.

Der volle Inhalt der Quelle
Annotation:
Battery systems bring technical and economic advantages to electrical distribution systems (EDSs), as they conveniently store the surplus of cheap renewable generation for use at a more convenient time and contribute to peak shaving. Due to the high cost of batteries, technical and economic studies are needed to evaluate their correct allocation within the EDS. To contribute to this analysis, this paper proposes a stochastic mathematical model for the optimal battery allocation (OBA), which can be guided by the optimization of two different economic metrics: net present value (NPV) and internal rate of return (IRR). The effects of the OBA in the EDS are evaluated considering the stochastic variation of photovoltaic generation and load. Tests with the 33-node IEEE test system indicate that OBA results in voltage profile improvement (~1% at peak time), peak reduction (31.17%), increased photovoltaic hosting capacity (18.8%), and cost reduction (3.06%). Furthermore, it was found that the IRR metric leads to a different solution compared to the traditional NPV optimization due to its inherent consideration of the relation between cash flow and investment. Thus, both NPV and IRR-based allocation alternatives can be used by the decision maker to improve economic and technical operation of the EDS.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Türel, Meryem, und Kazım Baycar. „Determinants of Bilateral Trade between Europeans and the Ottoman Empire: 1878-1913“. World Journal of Applied Economics 8, Nr. 2 (17.12.2022): 81–91. http://dx.doi.org/10.22440/wjae.8.2.3.

Der volle Inhalt der Quelle
Annotation:
During the 19th century, the Ottoman Empire experienced an increased integration into the world economy, primarily through the development of bilateral trade with European markets. This study examines the determinants of bilateral trade of the Ottoman Empire with its trading partners between 1878 and 1913 using a panel regression framework. The results indicate that the GDP of trading partners, distance, common borders, and the adoption of the metric system significantly affected bilateral trade. In contrast, the GDP of the Ottoman Empire, trade agreements, railways, and commercial ports had no statistically significant effects on the mentioned trade relations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Vorobeva, Alisa A. „Method for evaluating the industrial systems with built-in artificial intelligence robustness to adversarial attacks“. Proceedings of Tomsk State University of Control Systems and Radioelectronics 26, Nr. 4 (2023): 44–52. http://dx.doi.org/10.21293/1818-0442-2023-26-4-44-52.

Der volle Inhalt der Quelle
Annotation:
The paper presents a method for evaluating the industrial systems with built-in artificial intelligence (AI) robustness to adversarial attacks. The influence of adversarial attacks on the systems performance has been studied. The scheme and the scenarios to implement attacks on industrial systems with built-in AI were presented. A comprehensive set of metrics used to study the robustness of ML models has been proposed, including test data set quality metrics (MDQ), ML model quality metrics (MMQ), and model robustness to adversarial attacks metrics (MSQ). The method is based on the use of this metrics set and includes the following steps: generating a set of test data containing clean samples; assessing the quality of a test data set using MMQ metrics; identification of relevant adversarial attacks methods; generating adversarial examples and a test data set, containing the adversarial samples, to evaluate the robustness of the ML model; assessing the quality of the generated adversarial test data set using MDQ indicators; evaluating the quality of a ML model using MMQ indicators; evaluating model robustness using MSQ scores.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Mikryukov, A. A., und A. V. Kuular. „Development of the Incident Management Model in an Enterprise Information System Based on a Three-Tier Architecture Using Key (Relevant) Metrics“. Open Education 24, Nr. 3 (27.06.2020): 78–86. http://dx.doi.org/10.21686/1818-4243-2020-3-78-86.

Der volle Inhalt der Quelle
Annotation:
The aim of the study is to increase the efficiency of the incident management process in an enterprise information system. The article analyzes the work on improving the incident management process. The expediency of applying a number of key metrics is substantiated, which makes it possible to assess the degree to which the process indicators achieved their target values, that is, assess the quality of the incident management: the speed of solving the incident, the degree of satisfaction of service users and the availability of channels for processing user requests. A comparative analysis of the existing model of the incidents’ management process and the proposed model is performed. The proposed model, which includes an additional support line, can significantly improve key indicators of incident handling and resolution process. The scientific novelty of the developed proposals lies in the integrated use of a combination of process, technological and service metrics, which provides the construction of a more effective model of incident management.Materials and methods. The theoretical basis of the study is the analysis of recommendations for the use of metrics in accordance with: the management methodology of the COBIT information technology, recommendations for building an incident management process based on the ITIL library of information technology infrastructure, as well as the results of scientific research by Russian and foreign scientists and publications of leading organizations in the field of management incidents in enterprise information systems. The analysis of incident management process metrics is carried out. The mathematical methods of quantitative measurement of key metrics are used. The analysis of statistical data received by the technical support service for incident management processes was carried out.Results. The use of key metrics is justified, with the help of which the task of promptly responding to incidents, their subsequent processing and resolution is solved in conditions of ensuring guaranteed access to channels for processing calls. A three-tier incidents’ management model was developed, which made it possible to more effectively solve the problem of managing their processing based on the integrated use of key metrics.Conclusion. The study revealed the shortcomings of the existing model of the incident management process. The analysis of metrics used in existing models of the incident management process is carried out. The choice of a set of relevant metrics is substantiated, the complex application of which allowed us to develop a more effective incident management model that meets both the requirements of service consumers and the requirements for the operation of an information system. The developed model provides improved quality of incident processing (speed, completeness, reliability).A distinctive feature of the developed model is the use of objective quantitative characteristics obtained on the basis of relevant metrics of the incident management process, which made it possible to substantiate proposals for improving the existing incident management model in the enterprise information system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Lubkin, I. A. „Application security metrics when using defense system against vulnerabilities based on return-oriented programming“. Proceedings of Tomsk State University of Control Systems and Radioelectronics 24, Nr. 4 (2021): 46–51. http://dx.doi.org/10.21293/1818-0442-2021-24-4-46-51.

Der volle Inhalt der Quelle
Annotation:
The vulnerabilities using return-oriented programming pose threats to the functioning of information systems. There are many protection systems to counteract them. They are based on various principles of functioning. At the same time, there are no generally accepted approaches to assess the security of applied solutions. The paper proposes security metrics that allow obtaining objective data on the efficiency of protection against RoP vulnerabilities. Proposed security metrics show ability to perform attack by gain control over control flow graph.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Phan, Hoang Anh, Van Tan Duong, Mai Nguyen Thi, Anh Nguyen Thi, Hang Khuat Thi Thu, Thang Luu Duc, Van Hieu Dang, Huu Quoc Dong Tran, Thi Thanh Van Nguyen und Thanh Tung Bui. „Development of an Autonomous Component Testing System with Reliability Improvement Using Computer Vision and Machine Learning“. ECTI Transactions on Computer and Information Technology (ECTI-CIT) 18, Nr. 1 (10.02.2024): 64–75. http://dx.doi.org/10.37936/ecti-cit.2024181.253854.

Der volle Inhalt der Quelle
Annotation:
This study evaluated computer vision-based models, including Histogram Analysis, Logistic Regression, Sift-SVM, and Deep learning models, in an autonomous testing system developed for smartphone camera modules. System performance was assessed in a practical factory setting with workers operating the system, and metrics such as processing time, sensitivity, specificity, accuracy, and defect rate were evaluated. Based on the results, the Sift-SVM model demonstrated the greatest potential for enhancing the reliability of the system with a processing time of 0.01578 seconds, a sensitivity of 99.811%, and a reduction in the failure rate to 1888 PPM. The study findings suggest that Sift-SVM has the potential to be practically applied in the industry, thus improving the speed and accuracy of automatic defect detection in manufacturing and reducing the defect rate.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Wang, Jun, Heping Li und Haiyuan Lu. „An estimation of the evapotranspiration of typical steppe areas using Landsat images and the METRIC model“. Journal of Water and Climate Change 13, Nr. 2 (30.12.2021): 926–42. http://dx.doi.org/10.2166/wcc.2021.432.

Der volle Inhalt der Quelle
Annotation:
Abstract Remote sensing excels in estimating regional evapotranspiration (ET). However, most remote sensing energy balance models require researchers to subjectively extract the characteristic parameters of the dry and wet limits of the underlying surfaces. The regional ET accuracy is affected by wrong determined ideal pixels. This study used Landsat images and the METRIC model to evaluate the effects of different dry and wet pixel combinations on the ET in the typical steppe areas. The ET spatiotemporal changes of the different land cover types were discussed. The results show that the surface temperature and leaf area index could determine the dry and wet limits recognition schemes in grassland areas. The water vapor flux data of an eddy covariance system verified that the relative error between the ETd,METRIC and ETd,GES of eight DOYs (day of the year) was 18.8% on average. The ETMETRIC values of the crop growth season and the ETIMS of eight silage maize irrigation monitoring stations were found to have a relative error of 11.1% on average. The spatial distribution of the ET of the different land cover types in the study area was as follows: ETwater > ETarable land > ETforest land > ETunutilized land > ETgrassland > ETurban land.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Damini J. Dhondge und R. S. Talikoti. „Dynamic Analysis of Elevated Water Tanks“. Electronic Journal of Structural Engineering 19 (01.12.2019): 33–38. http://dx.doi.org/10.56748/ejse.19233.

Der volle Inhalt der Quelle
Annotation:
Water tanks are very important components of lifeline. They are vital component in municipal water system, firefighting systems and in many industrial facilities for storage of water. The water tanks get heavily damaged or collapsed during earthquake due to the fluid-structure interactions; hence the seismic be-havior of tanks has the characteristics of complex phenomena. Water storage tanks ought to stay practical within the post-earthquake amount to confirm potable water system to earthquake affected regions. The para-metric study suggests that the elevated circular tanks performs better than elevated rectangular tanks. In the present study, a dynamic analysis of elevated RCC water tanks design for the zone III and zone V as per Indi-an Standard: 1893-2002 (Part-2) and analyzed manually as well as using the software considering all the earthquake forces. Objective of this paper is to understand the dynamic behavior of elevated water tanks un-der earthquake loading.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ochella, Sunday, und Mahmood Shafiee. „Performance Metrics for Artificial Intelligence (AI) Algorithms Adopted in Prognostics and Health Management (PHM) of Mechanical Systems“. Journal of Physics: Conference Series 1828, Nr. 1 (01.02.2021): 012005. http://dx.doi.org/10.1088/1742-6596/1828/1/012005.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Metric system, 1898"

1

Heshmat, Dehkordi Yasamin. „Incorporating User Reviews as Implicit Feedback for Improving Recommender Systems“. Thesis, 2014. http://hdl.handle.net/1828/5605.

Der volle Inhalt der Quelle
Annotation:
Recommendation systems have become extremely common in recent years due to the ubiquity of information across various applications. Online entertainment (e.g., Netflix), E-commerce (e.g., Amazon, Ebay) and publishing services such as Google News are all examples of services which use recommender systems. Recommendation systems are rapidly evolving in these years, but these methods have fallen short in coping with several emerging trends such as likes or votes on reviews. In this work we have proposed a new method based on collaborative filtering by considering other users' feedback on each review. To validate our approach we have used Yelp data set with more than 335,000 product and service category ratings and 70,817 real users. We present our results using comparative analysis with other well-known recommendation systems for particular categories of users and items.
Graduate
0984
0800
yheshmat@uvic.ca
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Bai, Kuang. „Directional constraint qualifications and optimality conditions with application to bilevel programs“. Thesis, 2020. http://hdl.handle.net/1828/11939.

Der volle Inhalt der Quelle
Annotation:
The main purpose of this dissertation is to investigate directional constraint qualifications and necessary optimality conditions for nonsmooth set-constrained mathematical programs. First, we study sufficient conditions for metric subregularity of the set-constrained system. We introduce the directional version of the quasi-/pseudo-normality as a sufficient condition for metric subregularity, which is weaker than the classical quasi-/pseudo-normality, respectively. Then we apply our results to complementarity and Karush-Kuhn-Tucker systems. Secondly, we study directional optimality conditions of bilevel programs. It is well-known that the value function reformulation of bilevel programs provides equivalent single-level optimization problems, which are nonsmooth and never satisfy the usual constraint qualifications such as the Mangasarian-Fromovitz constraint qualification (MFCQ). We show that even the first-order sufficient condition for metric subregularity (which is generally weaker than MFCQ) fails at each feasible point of bilevel programs. We introduce the directional Clarke calmness condition and show that under the directional Clarke calmness condition, the directional necessary optimality condition holds. We perform directional sensitivity analysis of the value function and propose the directional quasi-normality as a sufficient condition for the directional Clarke calmness.
Graduate
2021-07-07
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Metric system, 1898"

1

Verschuur, Gerrit L. Impact! Oxford University Press, 1996. http://dx.doi.org/10.1093/oso/9780195101058.001.0001.

Der volle Inhalt der Quelle
Annotation:
Most scientists now agree that some sixty-five million years ago, an immense comet slammed into the Yucatan, detonating a blast twenty million times more powerful than the largest hydrogen bomb, punching a hole ten miles deep in the earth. Trillions of tons of rock were vaporized and launched into the atmosphere. For a thousand miles in all directions, vegetation burst into flames. There were tremendous blast waves, searing winds, showers of molten matter from the sky, earthquakes, and a terrible darkness that cut out sunlight for a year, enveloping the planet in freezing cold. Thousands of species of plants and animals were obliterated, including the dinosaurs, some of which may have become extinct in a matter of hours. In Impact, Gerrit L. Verschuur offers an eye-opening look at such catastrophic collisions with our planet. Perhaps more important, he paints an unsettling portrait of the possibility of new collisions with earth, exploring potential threats to our planet and describing what scientists are doing right now to prepare for this awful possibility. Every day something from space hits our planet, Verschuur reveals. In fact, about 10,000 tons of space debris fall to earth every year, mostly in meteoric form. The author recounts spectacular recent sightings, such as over Allende, Mexico, in 1969, when a fireball showered the region with four tons of fragments, and the twenty-six pound meteor that went through the trunk of a red Chevy Malibu in Peekskill, New York, in 1992 (the meteor was subsequently sold for $69,000 and the car itself fetched $10,000). But meteors are not the greatest threat to life on earth, the author points out. The major threats are asteroids and comets. The reader discovers that astronomers have located some 350 NEAs ("Near Earth Asteroids"), objects whose orbits cross the orbit of the earth, the largest of which are 1627 Ivar (6 kilometers wide) and 1580 Betula (8 kilometers). Indeed, we learn that in 1989, a bus-sized asteroid called Asclepius missed our planet by 650,000 kilometers (a mere six hours), and that in 1994 a sixty-foot object passed within 180,000 kilometers, half the distance to the moon. Comets, of course, are even more deadly. Verschuur provides a gripping description of the small comet that exploded in the atmosphere above the Tunguska River valley in Siberia, in 1908, in a blinding flash visible for several thousand miles (every tree within sixty miles of ground zero was flattened). He discusses Comet Swift-Tuttle--"the most dangerous object in the solar system"--a comet far larger than the one that killed off the dinosaurs, due to pass through earth's orbit in the year 2126. And he recounts the collision of Comet Shoemaker-Levy 9 with Jupiter in 1994, as some twenty cometary fragments struck the giant planet over the course of several days, casting titanic plumes out into space (when Fragment G hit, it outshone the planet on the infrared band, and left a dark area at the impact site larger than the Great Red Spot). In addition, the author describes the efforts of Spacewatch and other groups to locate NEAs, and evaluates the idea that comet and asteroid impacts have been an underrated factor in the evolution of life on earth. Astronomer Herbert Howe observed in 1897: "While there are not definite data to reason from, it is believed that an encounter with the nucleus of one of the largest comets is not to be desired." As Verschuur shows in Impact, we now have substantial data with which to support Howe's tongue-in-cheek remark. Whether discussing monumental tsunamis or the innumerable comets in the Solar System, this book will enthrall anyone curious about outer space, remarkable natural phenomenon, or the future of the planet earth.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Metric system, 1898"

1

Kidwell, Peggy Aldrich. „The Metric System Enters the American Classroom: 1790–1890“. In From Calculus to Computers, 229–36. The Mathematical Association of America, 2005. http://dx.doi.org/10.5948/upo9781614443032.026.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Turner, Anthony. „DECIMAL TIME“. In A General History of Horology, 341–46. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780198863915.003.0012.

Der volle Inhalt der Quelle
Annotation:
Abstract This chapter investigates the origins of interest in decimalization in the seventeenth century, together with early suggestions that it should be extended to time measurement. It describes the attempt of the French Revolutionary government to establish a total decimal, metric, system including time measurement and its failure. Decimal measurement in astronomy and geodesy however continued to be favoured during the nineteenth century, and a strong effort was once again made to establish a full metric system including decimal time between about 1890 and the First World War. Although this again failed, a decimal division of very small units of time did become established in scientific use.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Sahu, Anoop Kumar, Nitin Kumar Sahu und Atul Kumar Sahu. „Performance Estimation of Firms by G-L-A Supply Chain under Imperfect Data“. In Theoretical and Practical Advancements for Fuzzy System Integration, 245–77. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1848-8.ch010.

Der volle Inhalt der Quelle
Annotation:
Amongst various proposed SC philosophies, Lean, Green and Agile strategies of SC worked seminal to solve many problems of firms. Performance measurement acts as a tool to quantify overall efficiency via G-L-A SC activities of firm, where Green SC agenda is to control and diminish pollution and Lean SC helps to reduce waste of firm, while Agile SC target to manage SC more cum quick responding to clients. This chapter proposed a MCDM performance appraisement module (module constituted by mixing the segregated chain of green-lean-agile logistic activities and corresponding their interrelated metrics) conjunctive with Fuzzy Performance Index model in purpose to estimation the overall performance of individual firm. Furthermore, a centroid method coupled with fuzzy number set is proposed for classifying ill and strong G-L-A metrics of firm, so that managers could escalate their firms performance in case of non desirable performance. A hypothetical case research of two firms i.e. gear and shaft manufacturing firms are shown to measure their performance under G-LA supply chain.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Nan, Jiangxia, Ting Wang und Jingjing An. „Intuitionistic Fuzzy Distance-Based Intuitionistic Fuzzy TOPSIS Method and Application to MADM“. In Theoretical and Practical Advancements for Fuzzy System Integration, 72–96. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1848-8.ch004.

Der volle Inhalt der Quelle
Annotation:
In this paper, an intuitionistic fuzzy (IF) distance measure between two triangular intuitionistic fuzzy numbers (TIFNs) is developed. The metric properties of the proposed IF distance measures are also studied. Then, based on the IF distance, an extended TOPSIS is developed to solve multi-attribute decision making (MADM) problems with the ratings of alternatives on attributes of TIFNs. In this methodology, the IF distances between each alternative and the TIFN positive ideal-solution are calculated as well as the TIFN negative ideal-solution. Then the relative closeness degrees obtained of each alternative to the TIFN positive ideal solution are TIFNs. Based on the ranking methods of TIFNs the alternatives are ranked. A numerical example is examined to the validity and practicability of the method proposed in this paper.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

„Biology, Management, and Protection of North American Sturgeon“. In Biology, Management, and Protection of North American Sturgeon, herausgegeben von David H. Secor. American Fisheries Society, 2002. http://dx.doi.org/10.47886/9781888569360.ch8.

Der volle Inhalt der Quelle
Annotation:
<em>Abstract.</em>—This paper analyzes historical abundances of spawning stocks of Atlantic sturgeon <em>Acipenser oxyrinchus</em> during the late nineteenth century, when peak United States harvest of Atlantic sturgeon occurred (3,200 metric tons in 1888). The advent of preparation methods for caviar, transportation networks that allowed export of caviar to Europe, improvements in fishing technology, and development of a domestic smoked sturgeon market caused rapid emergence of an Atlantic sturgeon industry after the Civil War. The industry originated and was centered in the Delaware Bay, which supported the most abundant population on the U.S. East Coast. Important fisheries also developed in the Chesapeake Bay, the Carolinas, and Georgia. Caviar was the principal marketable product of the fishery and large females were targeted, resulting in fisheries collapse at the turn of the century. No substantial resurgence of Atlantic sturgeon landings has occurred in the twentieth century. A previous analysis of U.S. Fish Commission catch and effort records for the Delaware Bay fishery provided an estimate of 180,000 females prior to 1890. The Delaware Bay abundance estimate was extrapolated to other states by calculating the mean level of each state’s contribution to U.S. yields during the period 1880–1901. This approach led to abundance estimates of 29,000 for the Southern States (North Carolina, South Carolina, Georgia, Florida), 20,000 for the Chesapeake Bay (Maryland, Virginia), 180,000 for the Delaware Bay, and 6,000 for the Hudson River (New York). Although the approaches used to estimate historical biomass and abundance contain untested assumptions and biases, the dominance of the Delaware Bay population in comparison to others is in part confirmed by the industry that developed there. Given the uncertainty in abundance estimates, conservative benchmarks are proposed of 10,000 females each, for systems that previously supported important fisheries.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Hiiemäe, Mall. „Allikukivi koobas ja allikas kohapärimuses“. In Pühad allikad. Paar sammukest XXVII. Eesti Kirjandusmuuseumi aastaraamat 2010, 107–36. EKM Teaduskirjastus / ELM Scholarly Press, 2019. http://dx.doi.org/10.7592/ps/27.hiiemae.

Der volle Inhalt der Quelle
Annotation:
Geologists learned of the existence of the 33-metre-long Allikukivi Cave in the Devonian sandstone of south western Estonia only in 1961, when during excavation work a more than 7-metre-deep void opened under an excavator. Estonian lore of caves and cave systems describes them as starting points of underground passageways. They have been considered places of refuge during times of war and plague, sites of hidden treasure, and the dwelling places of nature giants. In describing the development story of this particular cave, geologists have used archival pieces from the Estonian Literary Museum’s Folklore Archives and reference material from earlier printed sources. The case study focuses on observing the geological phenomenon as a folklore- and landscape-related whole. There appear to be two different layers of tradition: one of them vanishing, the other vigorous. The episodes of the first contaminated text that reached the archives in 1890 feature spirits who come out of the opening near the spring. What follows is a legend of a giant that contains the motif of throwing a stone at a church. The connection with legends of giants dwelling in caves is manifested weakly and the text is fragmentary and vague showing the characteristics of departing from tradition. These features corroborate the geologists’ opinion that the cave in question may have been open in the past, but also suggests that when the cave closed in (or was deliberately shut because of the danger it presented) the legend gradually faded. The second plot then became predominant. The landscape components of the later folklore layer consist in three large openings on a hill (in a geological sense, three sinkholes in Devonian sandstone that appear when an underground hole caves in) and a spring that is connected to them (the holes appeared because water eroded the sandstone). The holes remain as the traces of buildings that sank underground due to the breaking of ethical norms that occurred when a beggar who turned up at a wedding was not allowed to stay for the night; in some versions the motif of the wedding guests turning into wolves is added (Aa 86, Aa 87 and Aa 73 in Antti Aarne’s 1918 catalogue of legends). Even if the cave is mentioned, it is not linked with the plot of the legend. However, important status is given to the spring that is created simultaneously to the building sinking into the ground, with the spring water turned into spirits. In 1961 Allikukivi Cave was taken under protection and its entrance was supported. The cave became a tourism object and the legend of the house sinking underground was activated. This is a good example of the revival of folklore in connection with tourist services. Today, the special focus of this popular tourism object is on all three landscape elements: the cave, a nearby sinkhole with a diameter of around seven metres, and the spring, which comes to the surface 15 m away. The discovery of the cave has introduced no new motifs to the plot of the legend, but in guided tours it has become customary practice to tell the legend of the wedding house, accompanied by the evidence in the landscape.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

McDivitt, Jordan A., Steffen G. Hagemann, Matthew S. Baggott und Stuart Perazzo. „Chapter 12: Geologic Setting and Gold Mineralization of the Kalgoorlie Gold Camp, Yilgarn Craton, Western Australia“. In Geology of the World’s Major Gold Deposits and Provinces, 251–74. Society of Economic Geologists, 2020. http://dx.doi.org/10.5382/sp.23.12.

Der volle Inhalt der Quelle
Annotation:
Abstract The Kalgoorlie gold camp in the Yilgarn craton of Western Australia comprises the supergiant Golden Mile and the smaller Mt. Charlotte, Mt. Percy, and Hidden Secret deposits. Since the camp’s discovery in 1893, ~1,950 metric tons (t) of Au have been produced from a total estimated endowment of ~2,300 t. The camp is located within Neoarchean rocks of the Kalgoorlie terrane, within the Eastern Goldfields superterrane of the eastern Yilgarn craton. Gold mineralization is distributed along an 8- × 2-km, NNW-trending corridor, which corresponds to the Boulder Lefroy-Golden Mile fault system. The host stratigraphic sequence, dated at ca. 2710 to 2660 Ma, comprises lower ultramafic and mafic lava flow rocks, and upper felsic to intermediate volcaniclastic, epiclastic, and lava flow rocks intruded by highly differentiated dolerite sills such as the ca. 2685 Ma Golden Mile Dolerite. Multiple sets of NNW-trending, steeply dipping porphyry dikes intruded this sequence from ca. 2675 to 2640 Ma. From ca. 2685 to 2640 Ma, rocks of the Kalgoorlie gold camp were subjected to multiple deformation increments and metamorphism. Early D1 deformation from ca. 2685 to 2675 Ma generated the Golden Mile fault and F1 folds. Prolonged sinistral transpression from ca. 2675 to 2655 Ma produced overprinting, NNW-trending sets of D2-D3 folds and faults. The last deformation stage (D4; &lt; ca. 2650 Ma) is recorded by N- to NNE-trending, dextral faults which offset earlier structures. The main mineralization type in the Golden Mile comprises Fimiston lodes: steeply dipping, WNW- to NNW-striking, gold- and telluride-bearing carbonate-quartz veins with banded, colloform, and crustiform textures surrounded by sericite-carbonate-quartz-pyrite-telluride alteration zones. These lodes were emplaced during the earlier stages of regional sinistral transpression (D2) as Riedel shear-type structures. During a later stage of regional sinistral transpression (D3), exceptionally high grade Oroya-type mineralization developed as shallowly plunging ore shoots with “Green Leader” quartz-sericite-carbonate-pyrite-telluride alteration typified by vanadium-bearing muscovite. In the Hidden Secret orebody, ~3 km north-northwest of the Golden Mile, lode mineralization is a silver-rich variety characterized by increased abundance of hessite and petzite and decreased abundance of calaverite. At the adjacent Mt. Charlotte deposit, the gold-, silver-, and telluride-bearing lodes become subordinate to the Mt. Charlotte-type stockwork veins. The stockwork veins occur as planar, 2- to 50-cm thick, auriferous quartz-carbonate-sulfide veins that define steeply NW- to SE-dipping and shallowly N-dipping sets broadly coeval with D4 deformation. Despite extensive research, there is no consensus on critical features of ore formation in the camp. Models suggest either (1) distinct periods of mineralization over a protracted, ca. 2.68 to 2.64 Ga orogenic history; or (2) broadly synchronous formation of the different types of mineralization at ca. 2.64 Ga. The nature of fluids, metal sources, and mineralizing processes remain debated, with both metamorphic and magmatic models proposed. There is strong evidence for multiple gold mineralization events over the course of the ca. 2.68 to 2.64 orogenic window, differing in genesis and contributions from either magmatic or metamorphic ore-forming processes. However, reconciling these models with field relationships and available geochemical and geochronological constraints remains difficult and is the subject of ongoing research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Metric system, 1898"

1

Iyengar, Madhusudan, Michael J. Ellsworth, Robert E. Simons und Levi A. Campbell. „Numerical Modeling of Jet Impingement and Validation of Convection: Conduction Decoupling in Thermal Design“. In ASME 2005 Pacific Rim Technical Conference and Exhibition on Integration and Packaging of MEMS, NEMS, and Electronic Systems collocated with the ASME 2005 Heat Transfer Summer Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/ipack2005-73386.

Der volle Inhalt der Quelle
Annotation:
The steady rise in cooling requirements of commercial computer products mandates the development of aggressive thermal management techniques, as well as accurate design and analysis methodologies. Single phase direct liquid jet impingement, offers a controlled high performance alternative, by eliminating the need for a thermal interface, and by delivering the coolant directly to the surface of the chip. This paper characterizes the thermal performance of a specific direct liquid jet impingement scheme in which the hot fluid exhausts via return vents located in the immediate vicinity of the jet. The study also quantifies the error associated with using the average heat transfer coefficient as a thermal performance metric for the non-uniform cooling boundary condition that occurs in such jet impingement solutions. The thermal performance of the direct liquid jet impingement designs are characterized and studied, via CFD (Computational Fluid Dynamics) models constructed using a commercial numerical solver. The hydraulic performance is analytically estimated using a simple loss coefficient based model. A square 10×10×0.75 mm3 chip, dissipating 400W, and cooled by water at 32°C, is considered as the representative example for the analysis. The effect of jet density on thermal performance is characterized for 1–400 jets/cm2, and for several feasible flow parameters, i.e. inlet jet velocities (5–10 m/s) and volumetric flow rates (946–1893 liters/minute). For the configurations explored, the optimal jet density was found to be 100 jets/cm2. An engineering cut-off point for the use of the 1-D average heat transfer coefficient metric, was identified as 10 jets/cm2. The error associated with use of a 1-D average heat transfer coefficient was shown to be in excess of 5% when the jet density is less than 10 jets/cm2, as high as 20% for the single jet case, and less than 0.7% for jet densities greater than 36 jets/cm2.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie