Добірка наукової літератури з теми "HASH METHODS"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "HASH METHODS".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "HASH METHODS"
Safaryan, Olga, Larissa Cherckesova, Nikita Lyashenko, Pavel Razumov, Vladislav Chumakov, Boris Akishin, and Andrey Lobodenko. "Modern Hash Collision CyberAttacks and Methods of Their Detection and Neutralization." Journal of Physics: Conference Series 2131, no. 2 (December 1, 2021): 022099. http://dx.doi.org/10.1088/1742-6596/2131/2/022099.
Повний текст джерелаBlackburn, Simon R. "Perfect Hash Families: Probabilistic Methods and Explicit Constructions." Journal of Combinatorial Theory, Series A 92, no. 1 (October 2000): 54–60. http://dx.doi.org/10.1006/jcta.1999.3050.
Повний текст джерелаJinnai, Yuu, and Alex Fukunaga. "On Hash-Based Work Distribution Methods for Parallel Best-First Search." Journal of Artificial Intelligence Research 60 (October 30, 2017): 491–548. http://dx.doi.org/10.1613/jair.5225.
Повний текст джерелаLiu, Xingbo, Xiushan Nie, Yingxin Wang, and Yilong Yin. "Jointly Multiple Hash Learning." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9981–82. http://dx.doi.org/10.1609/aaai.v33i01.33019981.
Повний текст джерелаFitas, Ricardo, Bernardo Rocha, Valter Costa, and Armando Sousa. "Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification." Journal of Imaging 7, no. 3 (March 8, 2021): 48. http://dx.doi.org/10.3390/jimaging7030048.
Повний текст джерелаMa, Xian-Qin, Chong-Chong Yu, Xiu-Xin Chen, and Lan Zhou. "Large-Scale Person Re-Identification Based on Deep Hash Learning." Entropy 21, no. 5 (April 30, 2019): 449. http://dx.doi.org/10.3390/e21050449.
Повний текст джерелаUssatova, О., Ye Begimbayeva, S. Nyssanbayeva, and N. Ussatov. "ANALYSIS OF METHODS AND PRACTICAL APPLICATION OF HASH FUNCTIONS." SERIES PHYSICO-MATHEMATICAL 5, no. 339 (October 15, 2021): 100–110. http://dx.doi.org/10.32014/2021.2518-1726.90.
Повний текст джерелаYARMILKO, Аndii, Inna ROZLOMII, and Yuliya MYSIURA. "USAGE OF HASH METHODS IN THE CRYPTOGRAPHIC DATA ANALYSIS." Herald of Khmelnytskyi National University 303, no. 6 (December 2021): 49–54. http://dx.doi.org/10.31891/2307-5732-2021-303-6-49-54.
Повний текст джерелаLong, Jun, Longzhi Sun, Liujie Hua, and Zhan Yang. "Discrete Semantics-Guided Asymmetric Hashing for Large-Scale Multimedia Retrieval." Applied Sciences 11, no. 18 (September 21, 2021): 8769. http://dx.doi.org/10.3390/app11188769.
Повний текст джерелаGabryel, Marcin, Konrad Grzanek, and Yoichi Hayashi. "Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic." Journal of Artificial Intelligence and Soft Computing Research 10, no. 4 (October 1, 2020): 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.
Повний текст джерелаДисертації з теми "HASH METHODS"
Kim, Kyung-Mi. "Perfect Hash Families: Constructions and Applications." Thesis, University of Waterloo, 2003. http://hdl.handle.net/10012/1118.
Повний текст джерелаKaščák, Andrej. "Komprese záznamů o IP tocích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235520.
Повний текст джерелаResch, Bernd, and Peter Romirer-Maierhofer. "Global Positioning in Harsh Environments." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-282.
Повний текст джерелаAs global location systems offer only restricted availability, they are not suitable for a world-
wide tracking application without extensions. This thesis contains a goods-tracking solution,
which can be considered globally working in contrast to formerly developed technologies. For
the creation of an innovative approach, an evaluation of the previous efforts has to be made.
As a result of this assessment, a newly developed solution is presented in this thesis that uses
the Global Positioning System (GPS) in connection with the database correlation method
involving Global System for Mobile Communications (GSM) fingerprints. The database
entries are generated automatically by measuring numerous GSM parameters such as Cell
Identity and signal strength involving handsets of several different providers and the real
reference position obtained via a high sensitivity GPS receiver.
Lisø, Kim Robert. "Building Envelope Performance Assessments in Harsh Climates : Methods for Geographically Dependent Design." Doctoral thesis, Norwegian University of Science and Technology, Department of Civil and Transport Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1123.
Повний текст джерелаThe lifetime of the built environment depends strongly on the severity of local climatic conditions. A well-functioning and reliable infrastructure is a precondition for economic growth and social development. The climate and topography of Norway puts great demands on the design and localization of buildings. The relationship between materials, structures and climatic impact is highly complex; illustrating the need for new and improved methods for vulnerability assessment of building envelope performance in relation to externally imposed climatic strains. Historically, major variations in climatic impact have led to corresponding large variations in building practice throughout the country - often well suited to local conditions. Today it is fair to say that sound building traditions and practice to some extent are being rejected in the quest for cost-effective solutions. Furthermore, projected changes in climatic conditions due to global warming will enhance the vulnerability within the built environment.
The primary objectives of the present dissertation are to increase the knowledge about possible impacts of climate change on building envelope performance, and to analyse and update methods for the planning and design of external envelopes in relation to climatic impact. This is accomplished through the development of integrated approaches and improved methods for assessing impacts of external climatic parameters on building envelopes, combining knowledge on materials, structures and relevant climate data, applicable for both historical data and scenarios for climate change. The results will contribute to more accurate building physics design guidelines, promoting high-performance building envelopes in harsh climates.
Approaches to assessments of the risks associated with climate change and buildings are suggested, identifying main areas of vulnerability in the construction industry. It is shown that there are benefits to be gained from the introduction of risk management strategies within a greater extent of the construction industry. A way of analysing the building economics of climate change is also proposed
Analyses of building defects are necessary in order to further develop tools, solutions and preventive measures ensuring high-performance building envelopes. To illuminate the vulnerability of different building envelope elements under varying climatic exposure, a comprehensive analysis of empirical data gathered from process induced building defect assignments is carried out. The amount of building defects in Norway clearly illustrates that it is not only the extreme weather events that need to be studied as a foundation for adaptation towards a changing climate. Furthermore, the analyses of defects reveal a fundamental need for climate differentiated design guidelines.
New and improved methods for geographically dependent design of building envelopes are proposed:
- A method for assessing the relative potential of frost decay or frost damage of porous, mineral building materials exposed to a given climate is developed.
- A national map of the potential for decay in wood structures is developed. Detailed scenarios for climate change for selected locations in Norway are used to provide an indication of the possible future development of decay rates.
- A method for assessing driving rain exposures based on multi-year records of synoptic observations of present weather, wind speed and direction is also presented.
These climate indices can be used as a tool for evaluation of changes in performance requirements or decay rates due to climate change under global warming incorporating data from regional- and local-level climate change scenarios. Historical records of climate data have finally been used to illuminate challenges arising when introducing international standards at the national level, without considering the need for adjustments to reflect varying local climatic conditions.
At present, building standards and design guidelines presuppose use of historic weather data. Historically, location-specific climate data have only to a very limited extent been applied systematically for design purposes, life cycle assessments, and climate differentiation of the suitability of a given technical solution in a given climate. The work is a first step towards methods and approaches allowing for geographically dependent climate considerations to be made in the development of design guidelines for high-performance building envelopes, and also approaches to assess the risks associated with the future performance of building envelopes due to climate change.
The dissertation focuses on methods for assessing impacts of external climatic parameters on a local scale, but with the use of daily and monthly averages of climate data. The reliability of climate indices or climate differentiated design guidelines is strongly dependent on the geographical spreading of the observing station network. The Norwegian network is not optimally distributed to fully embrace local variations, but provides a solid platform for the development of methods for geographically dependent design and guidelines on the appropriateness of different solutions in different climates.
Climate indices (using geographic information systems technology)allowing for quantitative assessment of building envelope performance or decay potential may be an important element in the development of adaptation measures to meet the future risks of climate change in different parts of the world. Finally, the work offers a conceptual point of departure for the development of a vintage model of the robustness of the Norwegian building stock.
Paper VII, IX, XI and XII reprinted with kind permission of Elsevier, sciencedirect.com
Rosettani, Matteo. "Algorithms and method for power management in HAS." Doctoral thesis, Università Politecnica delle Marche, 2011. http://hdl.handle.net/11566/242008.
Повний текст джерелаThere were many years that the possibility of uniforming the domotic system has been discussed, or rather the one relative to the automation of the house and it seems that we are proceeding to a period in which all the necessary factors for developing the Home Automation problematic will be available, in particular for those concerning the administration and the study of the logic that manages the house devices. The domotic, that is the set of technologies implemented to automate the house, is considered ready for the quality leap that would lead it out of the more traditional applications, also with big economical repercussions. The present worldwide market of the Home Automation industry has a total turnover of about 2.5 dollar billions, but within the 2014 it will be reach a value of 13.4 billions (source ING Direct). The smart home in addition with the concept of the Smart Grid appear, on the last annual report of the Consumer Electronics Association, as one of the rst ve technology to keep an eye on. However, it is necessary to consider a di erence between what the technologies allow to do and what an end-user could e ectively think to install at the moment. From the rst point of view, theoretically, it is all already done to realize a scenario in which the house installations are interconnected, dialogue with each other and with the users, eventually signal faults and, in some cases, anticipate the wishes of the owner. On the other hand, it is nevertheless true that the major white goods and home devices producers have not jet found an agreement about the communication standard to use for the data exchange among these appliances and, furthermore, the control policies relative to the coordination of the devices that have the objective of satisfying the end-user needs have not jet been de ned. This PhD thesis enters in the aforementioned topic, facing the just cited problems that characterize and limit the development of the Smart Home in the framework of the Smart grid programme, de ned and currently developed in Europe and United States. The approached thematics have been described distinguish them in two macro-areas: the rst one concerns the study and the analysis of the communication protocols to endow the house with a network in- frastructure needed to provide all the requests relative to the Home Automation. Thus, in a rst phase, the requisites for an home network infrastructure have been analyzed, such, for example, the energy consumption, the installation cost, the coverage range and the data transfer rate. In the following, an exhaustive analysis of the various communication protocols for the Home Automation has been done, focusing in particular in those ones candidate to become the HAN (Home Automation Network), complying with the speci cations de ned by the various Smart Grid consortium. Each one of these protocols has been compared with the requisites identi ed in the previous steps, creating a sort of classi cation on the basis of the accordance or less with these speci cations. At the end of this study, the candidate technologies for the role of HAN were three and, more speci cally, they were Bluetooth, ZigBee and the Lonworks protocol. After further tests, ZigBee prevailed among the two opponents, o ering a better correspondence with the Smart Grid requirements (Energy Pro le 2.0) and being already well accepted in the market as network infrastructure for the Home Automation. The second phase of this analysis was focused on the second problematic, relative to the control logic and coordination of the various devices that composes a typical household scenario. In particular, the rst section was concentrated on the de nition and determination of the needed theoretical framework for managing the two developed methods: it was showed the Woolridge approach to handle the MASs, modifying some aspects and concepts to comply them with the HASs class. Then, the analysis was focused on the study of the existent State of the Art, both for what concerns the the Multi Agent theory and that regarding the problematics relative to the resource allocation. These two developed methods have the purpose of resolving conflicts which can occur when the devices are trying to use shared resources in a typical household installation like, for example, the electricity and the hot water. The objective in resolving such conflicts consists in optimizing the whole system, trying to nd a functioning scheme of the various devices that can satisfy the demands and wishes of the end-user. Both the developed methods, called GT-HAS (Game Theoretic-HAS) and MKP-HAS (Multiperiod Knapsack Problem-HAS), use functions whose maximization permits to obtain locally and, given the properties of the built frameworks, also globally, performances that satisfy the preferences of the end-user. The analysis of this kind of problematic ends with the validation of the two methods, taking in exam some exemplifying scenarios and comparing the relative and absolute performances provided by GT-HAS and MKP-HAS.
Cichowski, Dawid [Verfasser], Peter [Akademischer Betreuer] Woias, and Ingo [Akademischer Betreuer] Krossing. "Rapid fabrication methods and modular packaging of chip-based microreactors for harsh multiphase reactions." Freiburg : Universität, 2017. http://d-nb.info/116814566X/34.
Повний текст джерелаBowden, Michael Russell. "Family Impact and Infant Emotional Outcomes when an Infant Has Serious Liver Disease: A Longitudinal Mixed Methods Study." Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/14702.
Повний текст джерелаRidge, Helen E. "A multi-method study to investigate whether the pharmacist has a role on the neonatal unit." Thesis, King's College London (University of London), 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.323152.
Повний текст джерелаMusa, Ibrahim, and Charles Nordström. "“And so each and every teacher has to handle it to the best of their abilities”." Thesis, Malmö universitet, Fakulteten för lärande och samhälle (LS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-28767.
Повний текст джерелаBotha, Marinda. "The use of sandplay psychotherapy with an adolescent who has poor self-esteem." Diss., University of Pretoria, 2010. http://hdl.handle.net/2263/25510.
Повний текст джерелаDissertation (MEd)--University of Pretoria, 2010.
Educational Psychology
unrestricted
Книги з теми "HASH METHODS"
Gottlieb, Adam. The art and science of cooking with cannabis: The most effective methods of preparing food & drink with marijuana, hashish & hash oil. Berkeley, Calif: Ronin Pub., 1993.
Знайти повний текст джерелаFain, Annika M. V. A comparison of water quality monitoring using Hach, LaMotte, and bench top methods. Bellingham, WA: Huxley College of Environmental Studies, Western Washington University, 1997.
Знайти повний текст джерелаWenn du willst, was du noch nie gehabt hast, dann tu, was du noch nie getan hast: Geschichten und Lebensweisheiten. Freiburg, Br: Herder, 2007.
Знайти повний текст джерелаRahman, Mizanur. Impact evaluation of the Mayer Hashi Program of long-acting and permanent methods of contraception in Bangladesh. Chapel Hill: Measure Evaluation, Carolina Population Center, 2014.
Знайти повний текст джерелаVoronin, Evgeniy, Aleksandr Chibunichev, and Yuriy Blohinov. Reliability of solving inverse problems of analytical photogrammetry. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2010462.
Повний текст джерелаSpirin, Yuriy, Sergey Zotov, Evgeniy Krasnov, and Nadezhda Cvetkova. Polder watercourses: research methods and geoecological assessment. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1903343.
Повний текст джерелаNakov, Svetlin. Fundamentals of Computer Programming with C#: The Bulgarian C# Book. Sofia, Bulgaria: Svetlin Nakov, 2013.
Знайти повний текст джерелаKas'yanova, Svetlana, Viktoriya Saliy, Zinaida Sharudina, Oksana Madatova, and Lyudmila Kucegreeva. Methodological aspects of the evaluation of the internal control system of the organization. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1907644.
Повний текст джерелаKsenofontov, Boris, and Aleksandr Lukanin. Flotation combines for wastewater treatment with several working fluids. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1938077.
Повний текст джерелаGREGORY, Lisa H. Essential Diy Cannabis Extracts : Beyond Cannabis Extracts: The Handbook to Diy Concentrates, Hash and Original Methods for Marijuana Extracts. Independently Published, 2020.
Знайти повний текст джерелаЧастини книг з теми "HASH METHODS"
van der Vegt, Steven, and Alfons Laarman. "A Parallel Compact Hash Table." In Mathematical and Engineering Methods in Computer Science, 191–204. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25929-6_18.
Повний текст джерелаPepper, Peter, Ralph Betschko, Sabine Dick, and Klaus Didrich. "Realizing sets by hash tables." In KORSO: Methods, Languages, and Tools for the Construction of Correct Software, 58–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0015455.
Повний текст джерелаMouha, Nicky. "Exploring Formal Methods for Cryptographic Hash Function Implementations." In Information Security and Privacy, 177–95. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35486-1_9.
Повний текст джерелаHai, Nguyen Minh, Quan Thanh Tho, and Le Duc Anh. "Multi-threaded On-the-Fly Model Generation of Malware with Hash Compaction." In Formal Methods and Software Engineering, 159–74. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47846-3_11.
Повний текст джерелаLiu, Huichuan, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma, and Xiaoyan Zhu. "Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization." In Communications in Computer and Information Science, 175–90. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_13.
Повний текст джерелаZhao, Na, and TianXiang Yue. "Modern HASM Method." In High Accuracy Surface Modeling Method: The Robustness, 41–70. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4027-8_2.
Повний текст джерелаWei, Xing, Huiqi Hu, Xuan Zhou, and Aoying Zhou. "A Chunk-Based Hash Table Caching Method for In-Memory Hash Joins." In Web Information Systems Engineering – WISE 2020, 376–89. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62008-0_26.
Повний текст джерелаLi, Fei, Hongzhi Wang, Liang Hao, Jianzhong Li, and Hong Gao. "pq-Hash: An Efficient Method for Approximate XML Joins." In Web-Age Information Management, 125–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16720-1_13.
Повний текст джерелаLi, Jiayi, Lulu Bei, Dan Li, Ping Cui, and Kai Huang. "A Video Parallel Retrieval Method Based on Deep Hash." In Simulation Tools and Techniques, 135–41. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97124-3_12.
Повний текст джерелаTsekouras, Vasileios, Sofia Mavrikou, and Spyridon Kintzios. "Trends in Biosensors and Current Detection Methods for Stress Monitoring of Plants Growing in Adverse Environmental Conditions." In Harsh Environment and Plant Resilience, 409–36. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65912-7_17.
Повний текст джерелаТези доповідей конференцій з теми "HASH METHODS"
van der Berg, Freark I., and Jaco van de Pol. "Concurrent Chaining Hash Maps for Software Model Checking." In 2019 Formal Methods in Computer Aided Design (FMCAD). IEEE, 2019. http://dx.doi.org/10.23919/fmcad.2019.8894279.
Повний текст джерелаKarabat, Cagatay, and Hakan Erdogan. "Biometric hash: A study on statistical quantization methods." In 2012 20th Signal Processing and Communications Applications Conference (SIU). IEEE, 2012. http://dx.doi.org/10.1109/siu.2012.6204595.
Повний текст джерелаMoreno, Pedro, Miguel Areias, and Ricardo Rocha. "Memory Reclamation Methods for Lock-Free Hash Tries." In 2019 31st International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD). IEEE, 2019. http://dx.doi.org/10.1109/sbac-pad.2019.00039.
Повний текст джерелаLuzhetsky, Volodymyr, and Yurii Baryshev. "Methods of generic attacks infeasibility increasing for hash functions." In 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). IEEE, 2013. http://dx.doi.org/10.1109/idaacs.2013.6663007.
Повний текст джерелаRayatidamavandi, Maede, Yu Zhuang, and Mahshid Rahnamay-Naeini. "A Comparison of Hash-Based Methods for Trajectory Clustering." In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2017. http://dx.doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.32.
Повний текст джерелаSasao, Tsutomu, and Munehiro Matsuura. "An Implementation of an Address Generator Using Hash Memories." In 2007 10th Euromicro Conference on Digital System Design: Architectures, Methods and Tools. IEEE, 2007. http://dx.doi.org/10.1109/dsd.2007.4341452.
Повний текст джерелаLuo, Xiao, Daqing Wu, Zeyu Ma, Chong Chen, Minghua Deng, Jinwen Ma, Zhongming Jin, Jianqiang Huang, and Xian-Sheng Hua. "CIMON: Towards High-quality Hash Codes." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/125.
Повний текст джерелаNouri, Mahdi, Ali Khezeli, Alireza Ramezani, and Azita Ebrahimi. "A dynamic chaotic hash function based upon circle chord methods." In 2012 Sixth International Symposium on Telecommunications (IST). IEEE, 2012. http://dx.doi.org/10.1109/istel.2012.6483140.
Повний текст джерелаKitsos, Paris, Nicolas Sklavos, and Athanassios N. Skodras. "Low Power FPGA Implementations of 256-bit Luffa Hash Function." In 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools (DSD). IEEE, 2010. http://dx.doi.org/10.1109/dsd.2010.19.
Повний текст джерела"HYBRID STEGANOGRAPHY USING INDEX CHANNEL AND 2-3-3 HASH METHODS." In International Conference on Research in Business management & Information Technology. ELK ASIA PACIFIC JOURNAL, 2015. http://dx.doi.org/10.16962/elkapj/si.it.icrbit-2015.25.
Повний текст джерелаЗвіти організацій з теми "HASH METHODS"
Yatsenko, Halyna, та Andriy Yatsenko. Використання креативних методів навчання під час викладання дисциплін «Історія української журналістики» і «Креативний текст». Ivan Franko National University of Lviv, березень 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11736.
Повний текст джерелаKiefner, John, and Harvey Haines. IPC-04-02 Comparisons of Pipeline Integrity Assessment Methods. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), September 2002. http://dx.doi.org/10.55274/r0011828.
Повний текст джерелаMasset, Edoardo, and Howard White. To boldly go where no evaluation has gone before: The CEDIL Evaluation Agenda. Centre for Excellence and Development Impact and Learning (CEDIL), July 2019. http://dx.doi.org/10.51744/ceap.
Повний текст джерелаMahmoud, Hussam, Guillermo Riveros, Lauren Hudak, and Emad Hassan. Experimental fatigue evaluation of underwater steel panels retrofitted with fiber polymers. Engineer Research and Development Center (U.S.), March 2023. http://dx.doi.org/10.21079/11681/46647.
Повний текст джерелаMills, Chris. PR-363-18604-Z01 Mass-Based Proving Methods for Mass Flow Meters. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), April 2019. http://dx.doi.org/10.55274/r0011579.
Повний текст джерелаLubkovych, Igor. METHODS OF JOURNALISTIC COMMUNICATION. Ivan Franko National University of Lviv, March 2021. http://dx.doi.org/10.30970/vjo.2021.50.11096.
Повний текст джерелаSingh, Anjali. Ultimate Guide to Automated Cell Counter: Plus Purchasing Tips. ConductScience, June 2022. http://dx.doi.org/10.55157/cs20220614.
Повний текст джерелаKiefner, Maxey, and Eiber. L51607 Pipeline Coating Impedance Effect on Powerline Fault Current Coupling. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), January 1989. http://dx.doi.org/10.55274/r0010294.
Повний текст джерелаCorscadden, Louise, and Anjali Singh. Grip Strength Test In Rodents. ConductScience, January 2023. http://dx.doi.org/10.55157/cs2023109.
Повний текст джерелаGonzález-Montaña, Luis Antonio. Semantic-based methods for morphological descriptions: An applied example for Neotropical species of genus Lepidocyrtus Bourlet, 1839 (Collembola: Entomobryidae). Verlag der Österreichischen Akademie der Wissenschaften, November 2021. http://dx.doi.org/10.1553/biosystecol.1.e71620.
Повний текст джерела