Artykuły w czasopismach na temat „Crowbar Application”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 25 najlepszych artykułów w czasopismach naukowych na temat „Crowbar Application”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
T.G. Joshi, Subhash, i Vinod John. "Thyristor voltage equalising network for crowbar application". IET Power Electronics 11, nr 11 (26.07.2018): 1839–48. http://dx.doi.org/10.1049/iet-pel.2017.0932.
Pełny tekst źródłaGrainys, Audrius, Jurij Novickij, Tomaš Stankevič, Voitech Stankevič, Vitalij Novickij i Nerija Žurauskienė. "Single Pulse Calibration of Magnetic Field Sensors Using Mobile 43 kJ Facility". Measurement Science Review 15, nr 5 (1.10.2015): 244–47. http://dx.doi.org/10.1515/msr-2015-0033.
Pełny tekst źródłaSeetawan, Tosawat. "Possibility of Thermoelectric Oxide for Thermal Sensors". Key Engineering Materials 675-676 (styczeń 2016): 601–6. http://dx.doi.org/10.4028/www.scientific.net/kem.675-676.601.
Pełny tekst źródłaLi, Xu, Yuping Lu i Tao Huang. "Impact of the DFIG-Based Wind Farm Connection on the Fault Component-Based Directional Relay and a Mitigation Countermeasure". Energies 13, nr 17 (26.08.2020): 4414. http://dx.doi.org/10.3390/en13174414.
Pełny tekst źródłaStankevic, Voitech, Povilas Simonis, Nerija Zurauskiene, Arunas Stirke, Aldas Dervinis, Vytautas Bleizgys, Skirmantas Kersulis i Saulius Balevicius. "Compact Square-Wave Pulse Electroporator with Controlled Electroporation Efficiency and Cell Viability". Symmetry 12, nr 3 (5.03.2020): 412. http://dx.doi.org/10.3390/sym12030412.
Pełny tekst źródłaNickles, Thomas. "The crowbar model of method and its implications". THEORIA. An International Journal for Theory, History and Foundations of Science 34, nr 3 (5.12.2019): 357. http://dx.doi.org/10.1387/theoria.19070.
Pełny tekst źródłaNian, Heng, i Xiao Jin. "Modeling and Analysis of Transient Reactive Power Characteristics of DFIG Considering Crowbar Circuit under Ultra HVDC Commutation Failure". Energies 14, nr 10 (11.05.2021): 2743. http://dx.doi.org/10.3390/en14102743.
Pełny tekst źródłaSaxena, Alok Kumar, Anand M. Rawool i Trilok C. Kaushik. "Crowbar Scheme Based on Plasma Motion for Pulsed Power Applications". IEEE Transactions on Plasma Science 41, nr 10 (październik 2013): 3058–62. http://dx.doi.org/10.1109/tps.2013.2279850.
Pełny tekst źródłaFery, Richard L., i Philip D. Dukes. "Southern Blight (Sclerotium rolfsiiSacc.) of Cowpea: Genetic Characterization of Two Sources of Resistance". International Journal of Agronomy 2011 (2011): 1–6. http://dx.doi.org/10.1155/2011/652404.
Pełny tekst źródłaAkin, D. Scott, i David R. Shaw. "In-Season Applications of Glyphosate for Control of Redvine (Brunnichia ovata) in Glyphosate-Resistant Soybean". Weed Technology 18, nr 2 (czerwiec 2004): 325–31. http://dx.doi.org/10.1614/wt-03-074r1.
Pełny tekst źródłaSalisbury, Elliot, Sebastian Stein i Sarvapali Ramchurn. "CrowdAR: Augmenting Live Video with a Real-Time Crowd". Proceedings of the AAAI Conference on Human Computation and Crowdsourcing 3 (23.09.2015): 169–77. http://dx.doi.org/10.1609/hcomp.v3i1.13220.
Pełny tekst źródłaWicaksono, Guntur, Septi Andryana i Benrahman. "Aplikasi Pendeteksi Penyakit Pada Daun Tanaman Apel Dengan Metode Convolutional Neural Network". JOINTECS (Journal of Information Technology and Computer Science) 5, nr 1 (25.01.2020): 9. http://dx.doi.org/10.31328/jointecs.v5i1.1221.
Pełny tekst źródłaMeng, Zhao Jun. "An Investigation of the Low Voltage Ride through Function of GE DFIG Wind Turbines for Electro-Mechanical Simulations". Advanced Materials Research 608-609 (grudzień 2012): 537–42. http://dx.doi.org/10.4028/www.scientific.net/amr.608-609.537.
Pełny tekst źródłaDöşoğlu, M. Kenan. "Crowbar hardware design enhancement for fault ride through capability in doubly fed induction generator-based wind turbines". ISA Transactions 104 (wrzesień 2020): 321–28. http://dx.doi.org/10.1016/j.isatra.2020.05.024.
Pełny tekst źródłaNovickij, Vitalij, Gediminas Staigvila, Arūnas Murauskas, Nina Rembialkowska, Julita Kulbacka i Jurij Novickij. "High Frequency Bipolar Electroporator with Double-Crowbar Circuit for Load-Independent Forming of Nanosecond Pulses". Applied Sciences 12, nr 3 (27.01.2022): 1370. http://dx.doi.org/10.3390/app12031370.
Pełny tekst źródłaYu, Yao, Shumei Liu, Lei Guo, Phee Lep Yeoh, Branka Vucetic i Yonghui Li. "CrowdR-FBC: A Distributed Fog-Blockchains for Mobile Crowdsourcing Reputation Management". IEEE Internet of Things Journal 7, nr 9 (wrzesień 2020): 8722–35. http://dx.doi.org/10.1109/jiot.2020.2996229.
Pełny tekst źródłaArifin, Zainal, Dominicus Danardono Dwi Prija Tjahjana, Rendy Adhi Rachmanto, Suyitno Suyitno, Singgih Dwi Prasetyo i Trismawati Trismawati. "Redesign Mata Bor Tanah Untuk Pembuatan Lubang Biopori Di Desa Puron, Kecamatan Bulu, Kabupaten Sukoharjo". Mekanika: Majalah Ilmiah Mekanika 19, nr 2 (29.09.2020): 60. http://dx.doi.org/10.20961/mekanika.v19i2.43393.
Pełny tekst źródłaHong, Fan, John S. Schreck i Petr Šulc. "Understanding DNA interactions in crowded environments with a coarse-grained model". Nucleic Acids Research 48, nr 19 (12.10.2020): 10726–38. http://dx.doi.org/10.1093/nar/gkaa854.
Pełny tekst źródłaKusova, Aleksandra M., Ilnaz T. Rakipov i Yuriy F. Zuev. "Effects of Homogeneous and Heterogeneous Crowding on Translational Diffusion of Rigid Bovine Serum Albumin and Disordered Alfa-Casein". International Journal of Molecular Sciences 24, nr 13 (6.07.2023): 11148. http://dx.doi.org/10.3390/ijms241311148.
Pełny tekst źródłaVweza, Alick-O., Chul-Gyu Song i Kil-To Chong. "Liquid–Liquid Phase Separation in the Presence of Macromolecular Crowding and State-Dependent Kinetics". International Journal of Molecular Sciences 22, nr 13 (22.06.2021): 6675. http://dx.doi.org/10.3390/ijms22136675.
Pełny tekst źródłaAndrew, Alex M. "Electric Drives And Their Controls, by Richard M. Crowder, Monographs in Electrical and Electronic Engineering Series, Oxford University Press, Oxford, 1995, ISBN 0-19-859371-6, Hardcover, xvii+ 238 pp.(£47.50)". Robotica 14, nr 5 (wrzesień 1996): 588. http://dx.doi.org/10.1017/s0263574700020129.
Pełny tekst źródłaRoberts, Jodie I., Jennifer K. Beatty, Michael A. Peplowski, Michael B. Keough, Bryan G. Yipp, Morley D. Hollenberg i Paul L. Beck. "Proceedings from the 6th Annual University of Calgary Leaders in Medicine Research Symposium". Clinical & Investigative Medicine 38, nr 6 (4.12.2015): 318. http://dx.doi.org/10.25011/cim.v38i6.26196.
Pełny tekst źródłaShan, Haoqi, Moyao Huang, Yujia Liu, Sravani Nissankararao, Yier Jin, Shuo Wang i Dean Sullivan. "CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight". Journal of Hardware and Systems Security, 15.06.2023. http://dx.doi.org/10.1007/s41635-023-00133-3.
Pełny tekst źródłaPerrot, Adeline, i Ruth Horn. "Preserving women’s reproductive autonomy while promoting the rights of people with disabilities?: the case of Heidi Crowter and Maire Lea-Wilson in the light of NIPT debates in England, France and Germany". Journal of Medical Ethics, 28.03.2022, medethics—2021–107912. http://dx.doi.org/10.1136/medethics-2021-107912.
Pełny tekst źródłaAl Khoufi, Emad. "Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80." Basic and Applied Sciences - Scientific Journal of King Faisal University 22, nr 1 (2021). http://dx.doi.org/10.37575/b/med/0038.
Pełny tekst źródła