Academic literature on the topic 'HASH METHODS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'HASH METHODS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "HASH METHODS"
Safaryan, Olga, Larissa Cherckesova, Nikita Lyashenko, Pavel Razumov, Vladislav Chumakov, Boris Akishin, and Andrey Lobodenko. "Modern Hash Collision CyberAttacks and Methods of Their Detection and Neutralization." Journal of Physics: Conference Series 2131, no. 2 (December 1, 2021): 022099. http://dx.doi.org/10.1088/1742-6596/2131/2/022099.
Full textBlackburn, Simon R. "Perfect Hash Families: Probabilistic Methods and Explicit Constructions." Journal of Combinatorial Theory, Series A 92, no. 1 (October 2000): 54–60. http://dx.doi.org/10.1006/jcta.1999.3050.
Full textJinnai, Yuu, and Alex Fukunaga. "On Hash-Based Work Distribution Methods for Parallel Best-First Search." Journal of Artificial Intelligence Research 60 (October 30, 2017): 491–548. http://dx.doi.org/10.1613/jair.5225.
Full textLiu, Xingbo, Xiushan Nie, Yingxin Wang, and Yilong Yin. "Jointly Multiple Hash Learning." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9981–82. http://dx.doi.org/10.1609/aaai.v33i01.33019981.
Full textFitas, Ricardo, Bernardo Rocha, Valter Costa, and Armando Sousa. "Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification." Journal of Imaging 7, no. 3 (March 8, 2021): 48. http://dx.doi.org/10.3390/jimaging7030048.
Full textMa, Xian-Qin, Chong-Chong Yu, Xiu-Xin Chen, and Lan Zhou. "Large-Scale Person Re-Identification Based on Deep Hash Learning." Entropy 21, no. 5 (April 30, 2019): 449. http://dx.doi.org/10.3390/e21050449.
Full textUssatova, О., Ye Begimbayeva, S. Nyssanbayeva, and N. Ussatov. "ANALYSIS OF METHODS AND PRACTICAL APPLICATION OF HASH FUNCTIONS." SERIES PHYSICO-MATHEMATICAL 5, no. 339 (October 15, 2021): 100–110. http://dx.doi.org/10.32014/2021.2518-1726.90.
Full textYARMILKO, Аndii, Inna ROZLOMII, and Yuliya MYSIURA. "USAGE OF HASH METHODS IN THE CRYPTOGRAPHIC DATA ANALYSIS." Herald of Khmelnytskyi National University 303, no. 6 (December 2021): 49–54. http://dx.doi.org/10.31891/2307-5732-2021-303-6-49-54.
Full textLong, Jun, Longzhi Sun, Liujie Hua, and Zhan Yang. "Discrete Semantics-Guided Asymmetric Hashing for Large-Scale Multimedia Retrieval." Applied Sciences 11, no. 18 (September 21, 2021): 8769. http://dx.doi.org/10.3390/app11188769.
Full textGabryel, Marcin, Konrad Grzanek, and Yoichi Hayashi. "Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic." Journal of Artificial Intelligence and Soft Computing Research 10, no. 4 (October 1, 2020): 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.
Full textDissertations / Theses on the topic "HASH METHODS"
Kim, Kyung-Mi. "Perfect Hash Families: Constructions and Applications." Thesis, University of Waterloo, 2003. http://hdl.handle.net/10012/1118.
Full textKaščák, Andrej. "Komprese záznamů o IP tocích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235520.
Full textResch, Bernd, and Peter Romirer-Maierhofer. "Global Positioning in Harsh Environments." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-282.
Full textAs global location systems offer only restricted availability, they are not suitable for a world-
wide tracking application without extensions. This thesis contains a goods-tracking solution,
which can be considered globally working in contrast to formerly developed technologies. For
the creation of an innovative approach, an evaluation of the previous efforts has to be made.
As a result of this assessment, a newly developed solution is presented in this thesis that uses
the Global Positioning System (GPS) in connection with the database correlation method
involving Global System for Mobile Communications (GSM) fingerprints. The database
entries are generated automatically by measuring numerous GSM parameters such as Cell
Identity and signal strength involving handsets of several different providers and the real
reference position obtained via a high sensitivity GPS receiver.
Lisø, Kim Robert. "Building Envelope Performance Assessments in Harsh Climates : Methods for Geographically Dependent Design." Doctoral thesis, Norwegian University of Science and Technology, Department of Civil and Transport Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1123.
Full textThe lifetime of the built environment depends strongly on the severity of local climatic conditions. A well-functioning and reliable infrastructure is a precondition for economic growth and social development. The climate and topography of Norway puts great demands on the design and localization of buildings. The relationship between materials, structures and climatic impact is highly complex; illustrating the need for new and improved methods for vulnerability assessment of building envelope performance in relation to externally imposed climatic strains. Historically, major variations in climatic impact have led to corresponding large variations in building practice throughout the country - often well suited to local conditions. Today it is fair to say that sound building traditions and practice to some extent are being rejected in the quest for cost-effective solutions. Furthermore, projected changes in climatic conditions due to global warming will enhance the vulnerability within the built environment.
The primary objectives of the present dissertation are to increase the knowledge about possible impacts of climate change on building envelope performance, and to analyse and update methods for the planning and design of external envelopes in relation to climatic impact. This is accomplished through the development of integrated approaches and improved methods for assessing impacts of external climatic parameters on building envelopes, combining knowledge on materials, structures and relevant climate data, applicable for both historical data and scenarios for climate change. The results will contribute to more accurate building physics design guidelines, promoting high-performance building envelopes in harsh climates.
Approaches to assessments of the risks associated with climate change and buildings are suggested, identifying main areas of vulnerability in the construction industry. It is shown that there are benefits to be gained from the introduction of risk management strategies within a greater extent of the construction industry. A way of analysing the building economics of climate change is also proposed
Analyses of building defects are necessary in order to further develop tools, solutions and preventive measures ensuring high-performance building envelopes. To illuminate the vulnerability of different building envelope elements under varying climatic exposure, a comprehensive analysis of empirical data gathered from process induced building defect assignments is carried out. The amount of building defects in Norway clearly illustrates that it is not only the extreme weather events that need to be studied as a foundation for adaptation towards a changing climate. Furthermore, the analyses of defects reveal a fundamental need for climate differentiated design guidelines.
New and improved methods for geographically dependent design of building envelopes are proposed:
- A method for assessing the relative potential of frost decay or frost damage of porous, mineral building materials exposed to a given climate is developed.
- A national map of the potential for decay in wood structures is developed. Detailed scenarios for climate change for selected locations in Norway are used to provide an indication of the possible future development of decay rates.
- A method for assessing driving rain exposures based on multi-year records of synoptic observations of present weather, wind speed and direction is also presented.
These climate indices can be used as a tool for evaluation of changes in performance requirements or decay rates due to climate change under global warming incorporating data from regional- and local-level climate change scenarios. Historical records of climate data have finally been used to illuminate challenges arising when introducing international standards at the national level, without considering the need for adjustments to reflect varying local climatic conditions.
At present, building standards and design guidelines presuppose use of historic weather data. Historically, location-specific climate data have only to a very limited extent been applied systematically for design purposes, life cycle assessments, and climate differentiation of the suitability of a given technical solution in a given climate. The work is a first step towards methods and approaches allowing for geographically dependent climate considerations to be made in the development of design guidelines for high-performance building envelopes, and also approaches to assess the risks associated with the future performance of building envelopes due to climate change.
The dissertation focuses on methods for assessing impacts of external climatic parameters on a local scale, but with the use of daily and monthly averages of climate data. The reliability of climate indices or climate differentiated design guidelines is strongly dependent on the geographical spreading of the observing station network. The Norwegian network is not optimally distributed to fully embrace local variations, but provides a solid platform for the development of methods for geographically dependent design and guidelines on the appropriateness of different solutions in different climates.
Climate indices (using geographic information systems technology)allowing for quantitative assessment of building envelope performance or decay potential may be an important element in the development of adaptation measures to meet the future risks of climate change in different parts of the world. Finally, the work offers a conceptual point of departure for the development of a vintage model of the robustness of the Norwegian building stock.
Paper VII, IX, XI and XII reprinted with kind permission of Elsevier, sciencedirect.com
Rosettani, Matteo. "Algorithms and method for power management in HAS." Doctoral thesis, Università Politecnica delle Marche, 2011. http://hdl.handle.net/11566/242008.
Full textThere were many years that the possibility of uniforming the domotic system has been discussed, or rather the one relative to the automation of the house and it seems that we are proceeding to a period in which all the necessary factors for developing the Home Automation problematic will be available, in particular for those concerning the administration and the study of the logic that manages the house devices. The domotic, that is the set of technologies implemented to automate the house, is considered ready for the quality leap that would lead it out of the more traditional applications, also with big economical repercussions. The present worldwide market of the Home Automation industry has a total turnover of about 2.5 dollar billions, but within the 2014 it will be reach a value of 13.4 billions (source ING Direct). The smart home in addition with the concept of the Smart Grid appear, on the last annual report of the Consumer Electronics Association, as one of the rst ve technology to keep an eye on. However, it is necessary to consider a di erence between what the technologies allow to do and what an end-user could e ectively think to install at the moment. From the rst point of view, theoretically, it is all already done to realize a scenario in which the house installations are interconnected, dialogue with each other and with the users, eventually signal faults and, in some cases, anticipate the wishes of the owner. On the other hand, it is nevertheless true that the major white goods and home devices producers have not jet found an agreement about the communication standard to use for the data exchange among these appliances and, furthermore, the control policies relative to the coordination of the devices that have the objective of satisfying the end-user needs have not jet been de ned. This PhD thesis enters in the aforementioned topic, facing the just cited problems that characterize and limit the development of the Smart Home in the framework of the Smart grid programme, de ned and currently developed in Europe and United States. The approached thematics have been described distinguish them in two macro-areas: the rst one concerns the study and the analysis of the communication protocols to endow the house with a network in- frastructure needed to provide all the requests relative to the Home Automation. Thus, in a rst phase, the requisites for an home network infrastructure have been analyzed, such, for example, the energy consumption, the installation cost, the coverage range and the data transfer rate. In the following, an exhaustive analysis of the various communication protocols for the Home Automation has been done, focusing in particular in those ones candidate to become the HAN (Home Automation Network), complying with the speci cations de ned by the various Smart Grid consortium. Each one of these protocols has been compared with the requisites identi ed in the previous steps, creating a sort of classi cation on the basis of the accordance or less with these speci cations. At the end of this study, the candidate technologies for the role of HAN were three and, more speci cally, they were Bluetooth, ZigBee and the Lonworks protocol. After further tests, ZigBee prevailed among the two opponents, o ering a better correspondence with the Smart Grid requirements (Energy Pro le 2.0) and being already well accepted in the market as network infrastructure for the Home Automation. The second phase of this analysis was focused on the second problematic, relative to the control logic and coordination of the various devices that composes a typical household scenario. In particular, the rst section was concentrated on the de nition and determination of the needed theoretical framework for managing the two developed methods: it was showed the Woolridge approach to handle the MASs, modifying some aspects and concepts to comply them with the HASs class. Then, the analysis was focused on the study of the existent State of the Art, both for what concerns the the Multi Agent theory and that regarding the problematics relative to the resource allocation. These two developed methods have the purpose of resolving conflicts which can occur when the devices are trying to use shared resources in a typical household installation like, for example, the electricity and the hot water. The objective in resolving such conflicts consists in optimizing the whole system, trying to nd a functioning scheme of the various devices that can satisfy the demands and wishes of the end-user. Both the developed methods, called GT-HAS (Game Theoretic-HAS) and MKP-HAS (Multiperiod Knapsack Problem-HAS), use functions whose maximization permits to obtain locally and, given the properties of the built frameworks, also globally, performances that satisfy the preferences of the end-user. The analysis of this kind of problematic ends with the validation of the two methods, taking in exam some exemplifying scenarios and comparing the relative and absolute performances provided by GT-HAS and MKP-HAS.
Cichowski, Dawid [Verfasser], Peter [Akademischer Betreuer] Woias, and Ingo [Akademischer Betreuer] Krossing. "Rapid fabrication methods and modular packaging of chip-based microreactors for harsh multiphase reactions." Freiburg : Universität, 2017. http://d-nb.info/116814566X/34.
Full textBowden, Michael Russell. "Family Impact and Infant Emotional Outcomes when an Infant Has Serious Liver Disease: A Longitudinal Mixed Methods Study." Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/14702.
Full textRidge, Helen E. "A multi-method study to investigate whether the pharmacist has a role on the neonatal unit." Thesis, King's College London (University of London), 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.323152.
Full textMusa, Ibrahim, and Charles Nordström. "“And so each and every teacher has to handle it to the best of their abilities”." Thesis, Malmö universitet, Fakulteten för lärande och samhälle (LS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-28767.
Full textBotha, Marinda. "The use of sandplay psychotherapy with an adolescent who has poor self-esteem." Diss., University of Pretoria, 2010. http://hdl.handle.net/2263/25510.
Full textDissertation (MEd)--University of Pretoria, 2010.
Educational Psychology
unrestricted
Books on the topic "HASH METHODS"
Gottlieb, Adam. The art and science of cooking with cannabis: The most effective methods of preparing food & drink with marijuana, hashish & hash oil. Berkeley, Calif: Ronin Pub., 1993.
Find full textFain, Annika M. V. A comparison of water quality monitoring using Hach, LaMotte, and bench top methods. Bellingham, WA: Huxley College of Environmental Studies, Western Washington University, 1997.
Find full textWenn du willst, was du noch nie gehabt hast, dann tu, was du noch nie getan hast: Geschichten und Lebensweisheiten. Freiburg, Br: Herder, 2007.
Find full textRahman, Mizanur. Impact evaluation of the Mayer Hashi Program of long-acting and permanent methods of contraception in Bangladesh. Chapel Hill: Measure Evaluation, Carolina Population Center, 2014.
Find full textVoronin, Evgeniy, Aleksandr Chibunichev, and Yuriy Blohinov. Reliability of solving inverse problems of analytical photogrammetry. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2010462.
Full textSpirin, Yuriy, Sergey Zotov, Evgeniy Krasnov, and Nadezhda Cvetkova. Polder watercourses: research methods and geoecological assessment. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1903343.
Full textNakov, Svetlin. Fundamentals of Computer Programming with C#: The Bulgarian C# Book. Sofia, Bulgaria: Svetlin Nakov, 2013.
Find full textKas'yanova, Svetlana, Viktoriya Saliy, Zinaida Sharudina, Oksana Madatova, and Lyudmila Kucegreeva. Methodological aspects of the evaluation of the internal control system of the organization. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1907644.
Full textKsenofontov, Boris, and Aleksandr Lukanin. Flotation combines for wastewater treatment with several working fluids. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1938077.
Full textGREGORY, Lisa H. Essential Diy Cannabis Extracts : Beyond Cannabis Extracts: The Handbook to Diy Concentrates, Hash and Original Methods for Marijuana Extracts. Independently Published, 2020.
Find full textBook chapters on the topic "HASH METHODS"
van der Vegt, Steven, and Alfons Laarman. "A Parallel Compact Hash Table." In Mathematical and Engineering Methods in Computer Science, 191–204. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25929-6_18.
Full textPepper, Peter, Ralph Betschko, Sabine Dick, and Klaus Didrich. "Realizing sets by hash tables." In KORSO: Methods, Languages, and Tools for the Construction of Correct Software, 58–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0015455.
Full textMouha, Nicky. "Exploring Formal Methods for Cryptographic Hash Function Implementations." In Information Security and Privacy, 177–95. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35486-1_9.
Full textHai, Nguyen Minh, Quan Thanh Tho, and Le Duc Anh. "Multi-threaded On-the-Fly Model Generation of Malware with Hash Compaction." In Formal Methods and Software Engineering, 159–74. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47846-3_11.
Full textLiu, Huichuan, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma, and Xiaoyan Zhu. "Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization." In Communications in Computer and Information Science, 175–90. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_13.
Full textZhao, Na, and TianXiang Yue. "Modern HASM Method." In High Accuracy Surface Modeling Method: The Robustness, 41–70. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4027-8_2.
Full textWei, Xing, Huiqi Hu, Xuan Zhou, and Aoying Zhou. "A Chunk-Based Hash Table Caching Method for In-Memory Hash Joins." In Web Information Systems Engineering – WISE 2020, 376–89. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62008-0_26.
Full textLi, Fei, Hongzhi Wang, Liang Hao, Jianzhong Li, and Hong Gao. "pq-Hash: An Efficient Method for Approximate XML Joins." In Web-Age Information Management, 125–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16720-1_13.
Full textLi, Jiayi, Lulu Bei, Dan Li, Ping Cui, and Kai Huang. "A Video Parallel Retrieval Method Based on Deep Hash." In Simulation Tools and Techniques, 135–41. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97124-3_12.
Full textTsekouras, Vasileios, Sofia Mavrikou, and Spyridon Kintzios. "Trends in Biosensors and Current Detection Methods for Stress Monitoring of Plants Growing in Adverse Environmental Conditions." In Harsh Environment and Plant Resilience, 409–36. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65912-7_17.
Full textConference papers on the topic "HASH METHODS"
van der Berg, Freark I., and Jaco van de Pol. "Concurrent Chaining Hash Maps for Software Model Checking." In 2019 Formal Methods in Computer Aided Design (FMCAD). IEEE, 2019. http://dx.doi.org/10.23919/fmcad.2019.8894279.
Full textKarabat, Cagatay, and Hakan Erdogan. "Biometric hash: A study on statistical quantization methods." In 2012 20th Signal Processing and Communications Applications Conference (SIU). IEEE, 2012. http://dx.doi.org/10.1109/siu.2012.6204595.
Full textMoreno, Pedro, Miguel Areias, and Ricardo Rocha. "Memory Reclamation Methods for Lock-Free Hash Tries." In 2019 31st International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD). IEEE, 2019. http://dx.doi.org/10.1109/sbac-pad.2019.00039.
Full textLuzhetsky, Volodymyr, and Yurii Baryshev. "Methods of generic attacks infeasibility increasing for hash functions." In 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). IEEE, 2013. http://dx.doi.org/10.1109/idaacs.2013.6663007.
Full textRayatidamavandi, Maede, Yu Zhuang, and Mahshid Rahnamay-Naeini. "A Comparison of Hash-Based Methods for Trajectory Clustering." In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2017. http://dx.doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.32.
Full textSasao, Tsutomu, and Munehiro Matsuura. "An Implementation of an Address Generator Using Hash Memories." In 2007 10th Euromicro Conference on Digital System Design: Architectures, Methods and Tools. IEEE, 2007. http://dx.doi.org/10.1109/dsd.2007.4341452.
Full textLuo, Xiao, Daqing Wu, Zeyu Ma, Chong Chen, Minghua Deng, Jinwen Ma, Zhongming Jin, Jianqiang Huang, and Xian-Sheng Hua. "CIMON: Towards High-quality Hash Codes." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/125.
Full textNouri, Mahdi, Ali Khezeli, Alireza Ramezani, and Azita Ebrahimi. "A dynamic chaotic hash function based upon circle chord methods." In 2012 Sixth International Symposium on Telecommunications (IST). IEEE, 2012. http://dx.doi.org/10.1109/istel.2012.6483140.
Full textKitsos, Paris, Nicolas Sklavos, and Athanassios N. Skodras. "Low Power FPGA Implementations of 256-bit Luffa Hash Function." In 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools (DSD). IEEE, 2010. http://dx.doi.org/10.1109/dsd.2010.19.
Full text"HYBRID STEGANOGRAPHY USING INDEX CHANNEL AND 2-3-3 HASH METHODS." In International Conference on Research in Business management & Information Technology. ELK ASIA PACIFIC JOURNAL, 2015. http://dx.doi.org/10.16962/elkapj/si.it.icrbit-2015.25.
Full textReports on the topic "HASH METHODS"
Yatsenko, Halyna, and Andriy Yatsenko. Використання креативних методів навчання під час викладання дисциплін «Історія української журналістики» і «Креативний текст». Ivan Franko National University of Lviv, March 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11736.
Full textKiefner, John, and Harvey Haines. IPC-04-02 Comparisons of Pipeline Integrity Assessment Methods. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), September 2002. http://dx.doi.org/10.55274/r0011828.
Full textMasset, Edoardo, and Howard White. To boldly go where no evaluation has gone before: The CEDIL Evaluation Agenda. Centre for Excellence and Development Impact and Learning (CEDIL), July 2019. http://dx.doi.org/10.51744/ceap.
Full textMahmoud, Hussam, Guillermo Riveros, Lauren Hudak, and Emad Hassan. Experimental fatigue evaluation of underwater steel panels retrofitted with fiber polymers. Engineer Research and Development Center (U.S.), March 2023. http://dx.doi.org/10.21079/11681/46647.
Full textMills, Chris. PR-363-18604-Z01 Mass-Based Proving Methods for Mass Flow Meters. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), April 2019. http://dx.doi.org/10.55274/r0011579.
Full textLubkovych, Igor. METHODS OF JOURNALISTIC COMMUNICATION. Ivan Franko National University of Lviv, March 2021. http://dx.doi.org/10.30970/vjo.2021.50.11096.
Full textSingh, Anjali. Ultimate Guide to Automated Cell Counter: Plus Purchasing Tips. ConductScience, June 2022. http://dx.doi.org/10.55157/cs20220614.
Full textKiefner, Maxey, and Eiber. L51607 Pipeline Coating Impedance Effect on Powerline Fault Current Coupling. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), January 1989. http://dx.doi.org/10.55274/r0010294.
Full textCorscadden, Louise, and Anjali Singh. Grip Strength Test In Rodents. ConductScience, January 2023. http://dx.doi.org/10.55157/cs2023109.
Full textGonzález-Montaña, Luis Antonio. Semantic-based methods for morphological descriptions: An applied example for Neotropical species of genus Lepidocyrtus Bourlet, 1839 (Collembola: Entomobryidae). Verlag der Österreichischen Akademie der Wissenschaften, November 2021. http://dx.doi.org/10.1553/biosystecol.1.e71620.
Full text