Gotowa bibliografia na temat „HASH METHODS”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „HASH METHODS”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "HASH METHODS"
Safaryan, Olga, Larissa Cherckesova, Nikita Lyashenko, Pavel Razumov, Vladislav Chumakov, Boris Akishin i Andrey Lobodenko. "Modern Hash Collision CyberAttacks and Methods of Their Detection and Neutralization". Journal of Physics: Conference Series 2131, nr 2 (1.12.2021): 022099. http://dx.doi.org/10.1088/1742-6596/2131/2/022099.
Pełny tekst źródłaBlackburn, Simon R. "Perfect Hash Families: Probabilistic Methods and Explicit Constructions". Journal of Combinatorial Theory, Series A 92, nr 1 (październik 2000): 54–60. http://dx.doi.org/10.1006/jcta.1999.3050.
Pełny tekst źródłaJinnai, Yuu, i Alex Fukunaga. "On Hash-Based Work Distribution Methods for Parallel Best-First Search". Journal of Artificial Intelligence Research 60 (30.10.2017): 491–548. http://dx.doi.org/10.1613/jair.5225.
Pełny tekst źródłaLiu, Xingbo, Xiushan Nie, Yingxin Wang i Yilong Yin. "Jointly Multiple Hash Learning". Proceedings of the AAAI Conference on Artificial Intelligence 33 (17.07.2019): 9981–82. http://dx.doi.org/10.1609/aaai.v33i01.33019981.
Pełny tekst źródłaFitas, Ricardo, Bernardo Rocha, Valter Costa i Armando Sousa. "Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification". Journal of Imaging 7, nr 3 (8.03.2021): 48. http://dx.doi.org/10.3390/jimaging7030048.
Pełny tekst źródłaMa, Xian-Qin, Chong-Chong Yu, Xiu-Xin Chen i Lan Zhou. "Large-Scale Person Re-Identification Based on Deep Hash Learning". Entropy 21, nr 5 (30.04.2019): 449. http://dx.doi.org/10.3390/e21050449.
Pełny tekst źródłaUssatova, О., Ye Begimbayeva, S. Nyssanbayeva i N. Ussatov. "ANALYSIS OF METHODS AND PRACTICAL APPLICATION OF HASH FUNCTIONS". SERIES PHYSICO-MATHEMATICAL 5, nr 339 (15.10.2021): 100–110. http://dx.doi.org/10.32014/2021.2518-1726.90.
Pełny tekst źródłaYARMILKO, Аndii, Inna ROZLOMII i Yuliya MYSIURA. "USAGE OF HASH METHODS IN THE CRYPTOGRAPHIC DATA ANALYSIS". Herald of Khmelnytskyi National University 303, nr 6 (grudzień 2021): 49–54. http://dx.doi.org/10.31891/2307-5732-2021-303-6-49-54.
Pełny tekst źródłaLong, Jun, Longzhi Sun, Liujie Hua i Zhan Yang. "Discrete Semantics-Guided Asymmetric Hashing for Large-Scale Multimedia Retrieval". Applied Sciences 11, nr 18 (21.09.2021): 8769. http://dx.doi.org/10.3390/app11188769.
Pełny tekst źródłaGabryel, Marcin, Konrad Grzanek i Yoichi Hayashi. "Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic". Journal of Artificial Intelligence and Soft Computing Research 10, nr 4 (1.10.2020): 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.
Pełny tekst źródłaRozprawy doktorskie na temat "HASH METHODS"
Kim, Kyung-Mi. "Perfect Hash Families: Constructions and Applications". Thesis, University of Waterloo, 2003. http://hdl.handle.net/10012/1118.
Pełny tekst źródłaKaščák, Andrej. "Komprese záznamů o IP tocích". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235520.
Pełny tekst źródłaResch, Bernd, i Peter Romirer-Maierhofer. "Global Positioning in Harsh Environments". Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-282.
Pełny tekst źródłaAs global location systems offer only restricted availability, they are not suitable for a world-
wide tracking application without extensions. This thesis contains a goods-tracking solution,
which can be considered globally working in contrast to formerly developed technologies. For
the creation of an innovative approach, an evaluation of the previous efforts has to be made.
As a result of this assessment, a newly developed solution is presented in this thesis that uses
the Global Positioning System (GPS) in connection with the database correlation method
involving Global System for Mobile Communications (GSM) fingerprints. The database
entries are generated automatically by measuring numerous GSM parameters such as Cell
Identity and signal strength involving handsets of several different providers and the real
reference position obtained via a high sensitivity GPS receiver.
Lisø, Kim Robert. "Building Envelope Performance Assessments in Harsh Climates : Methods for Geographically Dependent Design". Doctoral thesis, Norwegian University of Science and Technology, Department of Civil and Transport Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1123.
Pełny tekst źródłaThe lifetime of the built environment depends strongly on the severity of local climatic conditions. A well-functioning and reliable infrastructure is a precondition for economic growth and social development. The climate and topography of Norway puts great demands on the design and localization of buildings. The relationship between materials, structures and climatic impact is highly complex; illustrating the need for new and improved methods for vulnerability assessment of building envelope performance in relation to externally imposed climatic strains. Historically, major variations in climatic impact have led to corresponding large variations in building practice throughout the country - often well suited to local conditions. Today it is fair to say that sound building traditions and practice to some extent are being rejected in the quest for cost-effective solutions. Furthermore, projected changes in climatic conditions due to global warming will enhance the vulnerability within the built environment.
The primary objectives of the present dissertation are to increase the knowledge about possible impacts of climate change on building envelope performance, and to analyse and update methods for the planning and design of external envelopes in relation to climatic impact. This is accomplished through the development of integrated approaches and improved methods for assessing impacts of external climatic parameters on building envelopes, combining knowledge on materials, structures and relevant climate data, applicable for both historical data and scenarios for climate change. The results will contribute to more accurate building physics design guidelines, promoting high-performance building envelopes in harsh climates.
Approaches to assessments of the risks associated with climate change and buildings are suggested, identifying main areas of vulnerability in the construction industry. It is shown that there are benefits to be gained from the introduction of risk management strategies within a greater extent of the construction industry. A way of analysing the building economics of climate change is also proposed
Analyses of building defects are necessary in order to further develop tools, solutions and preventive measures ensuring high-performance building envelopes. To illuminate the vulnerability of different building envelope elements under varying climatic exposure, a comprehensive analysis of empirical data gathered from process induced building defect assignments is carried out. The amount of building defects in Norway clearly illustrates that it is not only the extreme weather events that need to be studied as a foundation for adaptation towards a changing climate. Furthermore, the analyses of defects reveal a fundamental need for climate differentiated design guidelines.
New and improved methods for geographically dependent design of building envelopes are proposed:
- A method for assessing the relative potential of frost decay or frost damage of porous, mineral building materials exposed to a given climate is developed.
- A national map of the potential for decay in wood structures is developed. Detailed scenarios for climate change for selected locations in Norway are used to provide an indication of the possible future development of decay rates.
- A method for assessing driving rain exposures based on multi-year records of synoptic observations of present weather, wind speed and direction is also presented.
These climate indices can be used as a tool for evaluation of changes in performance requirements or decay rates due to climate change under global warming incorporating data from regional- and local-level climate change scenarios. Historical records of climate data have finally been used to illuminate challenges arising when introducing international standards at the national level, without considering the need for adjustments to reflect varying local climatic conditions.
At present, building standards and design guidelines presuppose use of historic weather data. Historically, location-specific climate data have only to a very limited extent been applied systematically for design purposes, life cycle assessments, and climate differentiation of the suitability of a given technical solution in a given climate. The work is a first step towards methods and approaches allowing for geographically dependent climate considerations to be made in the development of design guidelines for high-performance building envelopes, and also approaches to assess the risks associated with the future performance of building envelopes due to climate change.
The dissertation focuses on methods for assessing impacts of external climatic parameters on a local scale, but with the use of daily and monthly averages of climate data. The reliability of climate indices or climate differentiated design guidelines is strongly dependent on the geographical spreading of the observing station network. The Norwegian network is not optimally distributed to fully embrace local variations, but provides a solid platform for the development of methods for geographically dependent design and guidelines on the appropriateness of different solutions in different climates.
Climate indices (using geographic information systems technology)allowing for quantitative assessment of building envelope performance or decay potential may be an important element in the development of adaptation measures to meet the future risks of climate change in different parts of the world. Finally, the work offers a conceptual point of departure for the development of a vintage model of the robustness of the Norwegian building stock.
Paper VII, IX, XI and XII reprinted with kind permission of Elsevier, sciencedirect.com
Rosettani, Matteo. "Algorithms and method for power management in HAS". Doctoral thesis, Università Politecnica delle Marche, 2011. http://hdl.handle.net/11566/242008.
Pełny tekst źródłaThere were many years that the possibility of uniforming the domotic system has been discussed, or rather the one relative to the automation of the house and it seems that we are proceeding to a period in which all the necessary factors for developing the Home Automation problematic will be available, in particular for those concerning the administration and the study of the logic that manages the house devices. The domotic, that is the set of technologies implemented to automate the house, is considered ready for the quality leap that would lead it out of the more traditional applications, also with big economical repercussions. The present worldwide market of the Home Automation industry has a total turnover of about 2.5 dollar billions, but within the 2014 it will be reach a value of 13.4 billions (source ING Direct). The smart home in addition with the concept of the Smart Grid appear, on the last annual report of the Consumer Electronics Association, as one of the rst ve technology to keep an eye on. However, it is necessary to consider a di erence between what the technologies allow to do and what an end-user could e ectively think to install at the moment. From the rst point of view, theoretically, it is all already done to realize a scenario in which the house installations are interconnected, dialogue with each other and with the users, eventually signal faults and, in some cases, anticipate the wishes of the owner. On the other hand, it is nevertheless true that the major white goods and home devices producers have not jet found an agreement about the communication standard to use for the data exchange among these appliances and, furthermore, the control policies relative to the coordination of the devices that have the objective of satisfying the end-user needs have not jet been de ned. This PhD thesis enters in the aforementioned topic, facing the just cited problems that characterize and limit the development of the Smart Home in the framework of the Smart grid programme, de ned and currently developed in Europe and United States. The approached thematics have been described distinguish them in two macro-areas: the rst one concerns the study and the analysis of the communication protocols to endow the house with a network in- frastructure needed to provide all the requests relative to the Home Automation. Thus, in a rst phase, the requisites for an home network infrastructure have been analyzed, such, for example, the energy consumption, the installation cost, the coverage range and the data transfer rate. In the following, an exhaustive analysis of the various communication protocols for the Home Automation has been done, focusing in particular in those ones candidate to become the HAN (Home Automation Network), complying with the speci cations de ned by the various Smart Grid consortium. Each one of these protocols has been compared with the requisites identi ed in the previous steps, creating a sort of classi cation on the basis of the accordance or less with these speci cations. At the end of this study, the candidate technologies for the role of HAN were three and, more speci cally, they were Bluetooth, ZigBee and the Lonworks protocol. After further tests, ZigBee prevailed among the two opponents, o ering a better correspondence with the Smart Grid requirements (Energy Pro le 2.0) and being already well accepted in the market as network infrastructure for the Home Automation. The second phase of this analysis was focused on the second problematic, relative to the control logic and coordination of the various devices that composes a typical household scenario. In particular, the rst section was concentrated on the de nition and determination of the needed theoretical framework for managing the two developed methods: it was showed the Woolridge approach to handle the MASs, modifying some aspects and concepts to comply them with the HASs class. Then, the analysis was focused on the study of the existent State of the Art, both for what concerns the the Multi Agent theory and that regarding the problematics relative to the resource allocation. These two developed methods have the purpose of resolving conflicts which can occur when the devices are trying to use shared resources in a typical household installation like, for example, the electricity and the hot water. The objective in resolving such conflicts consists in optimizing the whole system, trying to nd a functioning scheme of the various devices that can satisfy the demands and wishes of the end-user. Both the developed methods, called GT-HAS (Game Theoretic-HAS) and MKP-HAS (Multiperiod Knapsack Problem-HAS), use functions whose maximization permits to obtain locally and, given the properties of the built frameworks, also globally, performances that satisfy the preferences of the end-user. The analysis of this kind of problematic ends with the validation of the two methods, taking in exam some exemplifying scenarios and comparing the relative and absolute performances provided by GT-HAS and MKP-HAS.
Cichowski, Dawid [Verfasser], Peter [Akademischer Betreuer] Woias i Ingo [Akademischer Betreuer] Krossing. "Rapid fabrication methods and modular packaging of chip-based microreactors for harsh multiphase reactions". Freiburg : Universität, 2017. http://d-nb.info/116814566X/34.
Pełny tekst źródłaBowden, Michael Russell. "Family Impact and Infant Emotional Outcomes when an Infant Has Serious Liver Disease: A Longitudinal Mixed Methods Study". Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/14702.
Pełny tekst źródłaRidge, Helen E. "A multi-method study to investigate whether the pharmacist has a role on the neonatal unit". Thesis, King's College London (University of London), 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.323152.
Pełny tekst źródłaMusa, Ibrahim, i Charles Nordström. "“And so each and every teacher has to handle it to the best of their abilities”". Thesis, Malmö universitet, Fakulteten för lärande och samhälle (LS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-28767.
Pełny tekst źródłaBotha, Marinda. "The use of sandplay psychotherapy with an adolescent who has poor self-esteem". Diss., University of Pretoria, 2010. http://hdl.handle.net/2263/25510.
Pełny tekst źródłaDissertation (MEd)--University of Pretoria, 2010.
Educational Psychology
unrestricted
Książki na temat "HASH METHODS"
Gottlieb, Adam. The art and science of cooking with cannabis: The most effective methods of preparing food & drink with marijuana, hashish & hash oil. Berkeley, Calif: Ronin Pub., 1993.
Znajdź pełny tekst źródłaFain, Annika M. V. A comparison of water quality monitoring using Hach, LaMotte, and bench top methods. Bellingham, WA: Huxley College of Environmental Studies, Western Washington University, 1997.
Znajdź pełny tekst źródłaWenn du willst, was du noch nie gehabt hast, dann tu, was du noch nie getan hast: Geschichten und Lebensweisheiten. Freiburg, Br: Herder, 2007.
Znajdź pełny tekst źródłaRahman, Mizanur. Impact evaluation of the Mayer Hashi Program of long-acting and permanent methods of contraception in Bangladesh. Chapel Hill: Measure Evaluation, Carolina Population Center, 2014.
Znajdź pełny tekst źródłaVoronin, Evgeniy, Aleksandr Chibunichev i Yuriy Blohinov. Reliability of solving inverse problems of analytical photogrammetry. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2010462.
Pełny tekst źródłaSpirin, Yuriy, Sergey Zotov, Evgeniy Krasnov i Nadezhda Cvetkova. Polder watercourses: research methods and geoecological assessment. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1903343.
Pełny tekst źródłaNakov, Svetlin. Fundamentals of Computer Programming with C#: The Bulgarian C# Book. Sofia, Bulgaria: Svetlin Nakov, 2013.
Znajdź pełny tekst źródłaKas'yanova, Svetlana, Viktoriya Saliy, Zinaida Sharudina, Oksana Madatova i Lyudmila Kucegreeva. Methodological aspects of the evaluation of the internal control system of the organization. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1907644.
Pełny tekst źródłaKsenofontov, Boris, i Aleksandr Lukanin. Flotation combines for wastewater treatment with several working fluids. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1938077.
Pełny tekst źródłaGREGORY, Lisa H. Essential Diy Cannabis Extracts : Beyond Cannabis Extracts: The Handbook to Diy Concentrates, Hash and Original Methods for Marijuana Extracts. Independently Published, 2020.
Znajdź pełny tekst źródłaCzęści książek na temat "HASH METHODS"
van der Vegt, Steven, i Alfons Laarman. "A Parallel Compact Hash Table". W Mathematical and Engineering Methods in Computer Science, 191–204. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25929-6_18.
Pełny tekst źródłaPepper, Peter, Ralph Betschko, Sabine Dick i Klaus Didrich. "Realizing sets by hash tables". W KORSO: Methods, Languages, and Tools for the Construction of Correct Software, 58–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0015455.
Pełny tekst źródłaMouha, Nicky. "Exploring Formal Methods for Cryptographic Hash Function Implementations". W Information Security and Privacy, 177–95. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35486-1_9.
Pełny tekst źródłaHai, Nguyen Minh, Quan Thanh Tho i Le Duc Anh. "Multi-threaded On-the-Fly Model Generation of Malware with Hash Compaction". W Formal Methods and Software Engineering, 159–74. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47846-3_11.
Pełny tekst źródłaLiu, Huichuan, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma i Xiaoyan Zhu. "Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization". W Communications in Computer and Information Science, 175–90. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_13.
Pełny tekst źródłaZhao, Na, i TianXiang Yue. "Modern HASM Method". W High Accuracy Surface Modeling Method: The Robustness, 41–70. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4027-8_2.
Pełny tekst źródłaWei, Xing, Huiqi Hu, Xuan Zhou i Aoying Zhou. "A Chunk-Based Hash Table Caching Method for In-Memory Hash Joins". W Web Information Systems Engineering – WISE 2020, 376–89. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62008-0_26.
Pełny tekst źródłaLi, Fei, Hongzhi Wang, Liang Hao, Jianzhong Li i Hong Gao. "pq-Hash: An Efficient Method for Approximate XML Joins". W Web-Age Information Management, 125–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16720-1_13.
Pełny tekst źródłaLi, Jiayi, Lulu Bei, Dan Li, Ping Cui i Kai Huang. "A Video Parallel Retrieval Method Based on Deep Hash". W Simulation Tools and Techniques, 135–41. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97124-3_12.
Pełny tekst źródłaTsekouras, Vasileios, Sofia Mavrikou i Spyridon Kintzios. "Trends in Biosensors and Current Detection Methods for Stress Monitoring of Plants Growing in Adverse Environmental Conditions". W Harsh Environment and Plant Resilience, 409–36. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65912-7_17.
Pełny tekst źródłaStreszczenia konferencji na temat "HASH METHODS"
van der Berg, Freark I., i Jaco van de Pol. "Concurrent Chaining Hash Maps for Software Model Checking". W 2019 Formal Methods in Computer Aided Design (FMCAD). IEEE, 2019. http://dx.doi.org/10.23919/fmcad.2019.8894279.
Pełny tekst źródłaKarabat, Cagatay, i Hakan Erdogan. "Biometric hash: A study on statistical quantization methods". W 2012 20th Signal Processing and Communications Applications Conference (SIU). IEEE, 2012. http://dx.doi.org/10.1109/siu.2012.6204595.
Pełny tekst źródłaMoreno, Pedro, Miguel Areias i Ricardo Rocha. "Memory Reclamation Methods for Lock-Free Hash Tries". W 2019 31st International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD). IEEE, 2019. http://dx.doi.org/10.1109/sbac-pad.2019.00039.
Pełny tekst źródłaLuzhetsky, Volodymyr, i Yurii Baryshev. "Methods of generic attacks infeasibility increasing for hash functions". W 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). IEEE, 2013. http://dx.doi.org/10.1109/idaacs.2013.6663007.
Pełny tekst źródłaRayatidamavandi, Maede, Yu Zhuang i Mahshid Rahnamay-Naeini. "A Comparison of Hash-Based Methods for Trajectory Clustering". W 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2017. http://dx.doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.32.
Pełny tekst źródłaSasao, Tsutomu, i Munehiro Matsuura. "An Implementation of an Address Generator Using Hash Memories". W 2007 10th Euromicro Conference on Digital System Design: Architectures, Methods and Tools. IEEE, 2007. http://dx.doi.org/10.1109/dsd.2007.4341452.
Pełny tekst źródłaLuo, Xiao, Daqing Wu, Zeyu Ma, Chong Chen, Minghua Deng, Jinwen Ma, Zhongming Jin, Jianqiang Huang i Xian-Sheng Hua. "CIMON: Towards High-quality Hash Codes". W Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/125.
Pełny tekst źródłaNouri, Mahdi, Ali Khezeli, Alireza Ramezani i Azita Ebrahimi. "A dynamic chaotic hash function based upon circle chord methods". W 2012 Sixth International Symposium on Telecommunications (IST). IEEE, 2012. http://dx.doi.org/10.1109/istel.2012.6483140.
Pełny tekst źródłaKitsos, Paris, Nicolas Sklavos i Athanassios N. Skodras. "Low Power FPGA Implementations of 256-bit Luffa Hash Function". W 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools (DSD). IEEE, 2010. http://dx.doi.org/10.1109/dsd.2010.19.
Pełny tekst źródła"HYBRID STEGANOGRAPHY USING INDEX CHANNEL AND 2-3-3 HASH METHODS". W International Conference on Research in Business management & Information Technology. ELK ASIA PACIFIC JOURNAL, 2015. http://dx.doi.org/10.16962/elkapj/si.it.icrbit-2015.25.
Pełny tekst źródłaRaporty organizacyjne na temat "HASH METHODS"
Yatsenko, Halyna, i Andriy Yatsenko. Використання креативних методів навчання під час викладання дисциплін «Історія української журналістики» і «Креативний текст». Ivan Franko National University of Lviv, marzec 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11736.
Pełny tekst źródłaKiefner, John, i Harvey Haines. IPC-04-02 Comparisons of Pipeline Integrity Assessment Methods. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), wrzesień 2002. http://dx.doi.org/10.55274/r0011828.
Pełny tekst źródłaMasset, Edoardo, i Howard White. To boldly go where no evaluation has gone before: The CEDIL Evaluation Agenda. Centre for Excellence and Development Impact and Learning (CEDIL), lipiec 2019. http://dx.doi.org/10.51744/ceap.
Pełny tekst źródłaMahmoud, Hussam, Guillermo Riveros, Lauren Hudak i Emad Hassan. Experimental fatigue evaluation of underwater steel panels retrofitted with fiber polymers. Engineer Research and Development Center (U.S.), marzec 2023. http://dx.doi.org/10.21079/11681/46647.
Pełny tekst źródłaMills, Chris. PR-363-18604-Z01 Mass-Based Proving Methods for Mass Flow Meters. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), kwiecień 2019. http://dx.doi.org/10.55274/r0011579.
Pełny tekst źródłaLubkovych, Igor. METHODS OF JOURNALISTIC COMMUNICATION. Ivan Franko National University of Lviv, marzec 2021. http://dx.doi.org/10.30970/vjo.2021.50.11096.
Pełny tekst źródłaSingh, Anjali. Ultimate Guide to Automated Cell Counter: Plus Purchasing Tips. ConductScience, czerwiec 2022. http://dx.doi.org/10.55157/cs20220614.
Pełny tekst źródłaKiefner, Maxey i Eiber. L51607 Pipeline Coating Impedance Effect on Powerline Fault Current Coupling. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), styczeń 1989. http://dx.doi.org/10.55274/r0010294.
Pełny tekst źródłaCorscadden, Louise, i Anjali Singh. Grip Strength Test In Rodents. ConductScience, styczeń 2023. http://dx.doi.org/10.55157/cs2023109.
Pełny tekst źródłaGonzález-Montaña, Luis Antonio. Semantic-based methods for morphological descriptions: An applied example for Neotropical species of genus Lepidocyrtus Bourlet, 1839 (Collembola: Entomobryidae). Verlag der Österreichischen Akademie der Wissenschaften, listopad 2021. http://dx.doi.org/10.1553/biosystecol.1.e71620.
Pełny tekst źródła