Добірка наукової літератури з теми "Logging"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Logging".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Logging"

1

Zhiyou, Liu, Huo Jinghuan, and Zhu Xiaogang. "The application of digital logging in exploration of Jiang Cang coalfield in Qinghai province." International Journal of Geology 1, no. 1 (July 21, 2016): 44. http://dx.doi.org/10.26789/ijg.2016.006.

Повний текст джерела
Анотація:
A lot of well logging on to Jiang Cang coalfield in the past work and achieved good results, but due to differ in age, instrumentation equipment and method were different. In order to understand the application effect of the equipment used in the area now and in order to provide the basis for the future working to choose the appropriate logging parameters and well logging interpretation, we chosed GJS - 1 b intelligent engineering logging system produced by Chongqing geological instrument factory in Jiang Cang mining area, we collected the data when cable were ascending, according to 《the requirements of the rules of coalfield geophysical logging》, JGS - 1 b instrument full hole resistivity logging velocity of 3 m/s, the sampling interval was 5 cm, acoustic logging measurement parameter for the acoustic time, adopt the device of single-emission and double-receiving, detectorsource space was 0.5 meters, 0.7 meters, the full hole velocity was 6 m/s, the sampling interval was 10 cm.In this paper, we introduce the application of multiple well logging method in coalfield geology through to the logging examples in Mu Li Jang Cang coalfield four field of qinghai province, the effect was remarkable
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Price, Blaine A., Avelie Stuart, Gul Calikli, Ciaran Mccormick, Vikram Mehta, Luke Hutton, Arosha K. Bandara, Mark Levine, and Bashar Nuseibeh. "Logging you, Logging me." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, no. 2 (June 30, 2017): 1–18. http://dx.doi.org/10.1145/3090087.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Studwell, William E. "Logging on and Cata-Logging." Behavioral & Social Sciences Librarian 16, no. 1 (September 22, 1997): 69–71. http://dx.doi.org/10.1300/j103v16n01_06.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

de Silva, Amal P., and W. Keith Patterson. "Influence of Root Flooding Interval on Phytophthora Root Rot of Blueberry." HortScience 32, no. 3 (June 1997): 468D—468. http://dx.doi.org/10.21273/hortsci.32.3.468d.

Повний текст джерела
Анотація:
Phytophthora root rot is a severe disease on blueberry (Vaccinium corymbosum L.) in poorly drained soils. The objective of the study was to determine the frequency of water-logged conditions on disease severity of blueberry. Phytophthora cinnamomi was grown on rice hulls and incorporated into the soil at the rate of 10% v/v. Water logging conditions were inflicted for 48 hr on mulched and non–mulched blueberry plants at 1-, 2-, and 4-week intervals. Non-water logging conditions were used on both mulched and non-mulched control plants. There was a significant linear relationship between disease severity of shoots and roots and the frequency of water-logging conditions. Disease symptoms were low in control plants, but disease ratings were high in mulched and non-mulched plants that were treated with water-logging conditions every week. There was also a linear trend between shoot dry weight and root dry weight of plants with frequency of water logging. Higher dry weights were seen on control plants. There was a significantly higher shoot, root dry weight and number of leaves of mulched plants than non-mulched plants. The percentage of infection on roots were high with frequent water logging. The study revealed high disease incidence with frequent water loggings. However, growth of mulched blueberry plants were comparable in control plants and plants that were subjected to water logging at 4-week intervals.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lin, Jiunn-Cheng, Jun-Yen Lee, and Wan-Yu Liu. "Risk Analysis of Regions with Suspicious Illegal Logging and Their Trade Flows." Sustainability 13, no. 6 (March 23, 2021): 3549. http://dx.doi.org/10.3390/su13063549.

Повний текст джерела
Анотація:
To eradicate illegally harvested wood sources in its domestic market, it is critical to conduct risk assessments on wood sourcing in regions with illegal loggings. It is not reliable to use a single indicator to analyze suspicious illegal logging. This study integrates three key global indicators: CPI (Corruption Perceptions Index), HDI (Human Development Indicator), and WGI (The Worldwide Governance Indicators) by applying the entropy weight method to establish a new risk indicator to rank suspicious illegal logging regions. This study aims to establish better risk indicators by considering more factors to assess the risks of illegal logging and its trade flow more reliably. By analyzing roundwood production, Myanmar, Congo, and Nigeria are rated high-risk. Countries such as the U.S., Germany, Canada, and Finland are rated low-risk.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Nurhadiyanto, Lucky. "ALUR PELACAKAN PEMBALAKAN LIAR (ILLEGAL LOGGING) MELALUI PENDEKATAN PENCUCIAN UANG." SISI LAIN REALITA 1, no. 2 (December 11, 2016): 33–46. http://dx.doi.org/10.25299/sisilainrealita.2016.vol1(2).1385.

Повний текст джерела
Анотація:
Illegal logging is a part of crime against environment, which has a massive impact on the economy, social, cultural, and ecological. Ironically, majority of the illegal logging’s perpetrators are dominated by “the field criminal”. On the other side, intellectual actors who can control the activities never touch by the law. The money laundering concept can give a new approach to detect the leader actor. The author use follow the money viewpoint, which includes placement, layering, and integration. Qualitative data collection methods is used with in-depth interviews, systematic observation of the behavior, and document analysis. The result is a new paradigm in investigating illegal logging no longer focused on the field actors, but potentially tracking the intellectual actors behind illegal logging.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Solt, John. "Treacherous Logging." Voice of Intellectual Man- An International Journal 9, no. 2 (2019): 151. http://dx.doi.org/10.5958/2319-4308.2019.00025.2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Mueller, H. Gustav. "Data logging." Hearing Journal 60, no. 10 (October 2007): 19. http://dx.doi.org/10.1097/01.hj.0000295442.16133.d7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Brown, Alastair. "Selective logging." Nature Climate Change 2, no. 1 (December 20, 2011): 23. http://dx.doi.org/10.1038/nclimate1361.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Jones, S., SM Gatford, T. Do, and S. Walker. "Transaction logging." Journal of Documentation 53, no. 1 (March 1997): 35–50. http://dx.doi.org/10.1108/eum0000000007189.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Logging"

1

Karlsson, Tobias, and Andreas Pettersson. "Software keystroke logging : Automatisering av skydd mot software keystroke logging." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19618.

Повний текст джерела
Анотація:
This piece of work develops a solution that automates protection against software keystroke loggers. Keystroke loggers can be used illegally to register a user's keystrokes and in that way acquire sensitive information. The solution was tested on two different networks and the efficiency was measured. The network represents an enterprise network that uses the operating system Windows along with the directory service Active Directory. A script was developed to solve the automation matter. The script automatically executed the required programs that were needed to clean the network completely from keystroke loggers we had implemented and it took less than one minute to run.
Detta arbete utvecklar en lösning som automatiserar skydd mot mjukvarukeyloggers. Keystroke loggers kan användas illegalt för att registrera en användares knappnedtryckningar och på så vis komma över känslig information. Lösningen testkörs på två olika nätverk och effektiviteten mäts. Nätverket representerar ett företagsnätverk som använder operativsystemet Windows med katalogtjänsten Active Directory. Ett skript utvecklades för att lösa automatiseringsfrågan. Skriptet exekverade automatiskt de program som behövdes för att rensa nätverket helt från de keystroke loggers vi implementerat och det tog mindre än en minut att köra.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Sluss, Richard Gordon. "Managerial and operational characteristics of "safety successful" logging contractors." Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-09122009-040333/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Loving, Easton. "Components of logging costs." Thesis, This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-10222009-124937/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Sklar, Howard Fred. "Nuclear magnetic resonance logging." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10503.

Повний текст джерела
Анотація:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Earth, Atmospheric, and Planetary Sciences, 1997.
Includes bibliographical references (leaves 119-121).
by Howard Fred Sklar.
M.S.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mendelson, J. D. (James D. ). "Petroleum source rock logging." Thesis, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/15126.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Miyata, Edwin S. "An investigation of the monocable system for cable yarding of small, low-value trees on steep, difficult sites /." Thesis, Connect to this title online; UW restricted, 1991. http://hdl.handle.net/1773/7061.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Brodbeck, Arnold M. "Timber industry consolidation and the need for scale appropriate harvesting mechanisms in Alabama's black belt." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/master's/BRODBECK_ARNOLD_5.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Pulls, Tobias. "Preserving Privacy in Transparency Logging." Doctoral thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-35918.

Повний текст джерела
Анотація:
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Jun, Ho Huh Jun Ho. "Trustworthy logging for virtual organisations." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:7266bcda-a82b-4b4f-9ec5-d46f8f3573a0.

Повний текст джерела
Анотація:
In order to securely monitor user or system activities and detect malicious attempts across a distributed system, provision of trustworthy audit and logging services is necessary. Existing audit-based monitoring services, however, are often prone to compromise due to the lack of guarantees of log integrity, confidentiality, and availability. This thesis presents several use cases where these properties are essential, conducts a threat analysis on these use cases, and identifies key security requirements from the threats and their risks. Then, this thesis proposes a log generation and reconciliation infrastructure in which the requirements are satisfied and threats are mitigated. Applications usually expose a weak link in the way logs are generated and protected. In the proposed logging system, important application events are involuntarily recorded through a trustworthy logging component operating inside a privileged virtual machine. Virtual machine isolation makes it infeasible for applications to bypass the logging component. Trusted Computing attestation allows users to verify the logging properties of remote systems, and ensure that the collected logs are trustworthy. Despite ongoing research in the area of usable security for distributed systems, there remains a `trust gap' between the users' requirements and current technological capabilities. To bridge this `trust gap', this thesis also proposes two different types of distributed systems, one applicable for a computational system and the other for a distributed data system. Central to these systems is the configuration resolver which maintains a list of trustworthy participants available in the virtual organisation. Users submit their jobs to the configuration resolver, knowing that their jobs will be dispatched to trustworthy participants and executed in protected environments. As a form of evaluation, this thesis suggests how these ideas could be integrated with existing systems, and highlights the potential security enhancements.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Banchs, Rafael Enrique. "Time harmonic field electric logging /." Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Logging"

1

(Firm), Robertson Geologging. Borehole logging. Deganwy: Robertson Geologging, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Society of Petroleum Engineers of AIME., ed. Production logging. Richardson, TX: Society of Petroleum Engineers, 1985.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

1927-, Keller George Vernon, ed. Induction logging. Amsterdam: Elsevier, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

L, Campbell Frank, ed. Well logging II: Electric and acoustic logging. New York: Henry L. Doherty Memorial Fund of AIME, Society of Petroleum Engineers, 1986.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Chin, Wilson C. Electromagnetic Well Logging. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118835074.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Sainson, Stéphane. Electromagnetic Seabed Logging. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-45355-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Koshak, George. Koshak Brothers logging. Friendship, Wis: New Past Press, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Elias. Reduced impact logging. Bogor: IPB Press, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Society of Petroleum Engineers (U.S.), ed. Openhole well logging. Richardson, TX: Society of Petroleum Engineers, 1986.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Martin, Mary L. Logging long ago. Atglen, PA: Schiffer Pub., 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Logging"

1

Plattner, Hasso. "Logging." In Lehrbuch In-Memory Data Management, 191–99. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-03213-5_28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Schwenkler, Thomas. "Logging." In Sicheres Netzwerkmanagement, 151–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/3-540-31287-0_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Plattner, Hasso. "Logging." In A Course in In-Memory Data Management, 185–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36524-9_28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Edwards, Elsy. "Logging." In Issues & Arguments, 210–18. London: Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-11090-2_35.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Noble, Elizabeth. "Logging." In Pro T-SQL 2019, 345–60. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5590-2_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Schwichtenberg, Holger. "Logging." In Modern Data Access with Entity Framework Core, 275–85. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3552-2_12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Putrady, Ecky. "Logging." In Practical Web Development with Haskell, 69–83. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3739-7_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

O’Leary, Mike. "Logging." In Cyber Operations, 283–309. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Plattner, Hasso. "Logging." In A Course in In-Memory Data Management, 197–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55270-0_29.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Duft, Markus. "Logging." In Eclipse TEA Revealed, 45–51. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4093-9_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Logging"

1

Bogatinovski, Jasmin, and Odej Kao. "Auto-Logging: AI-centred Logging Instrumentation." In 2023 IEEE/ACM 45th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). IEEE, 2023. http://dx.doi.org/10.1109/icse-nier58687.2023.00023.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lovell, M. A., P. Harvey, and J. Lofts. "Geochemical Logging." In 3rd International Congress of the Brazilian Geophysical Society. European Association of Geoscientists & Engineers, 1993. http://dx.doi.org/10.3997/2214-4609-pdb.324.964.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Yao, Chang, Divyakant Agrawal, Gang Chen, Beng Chin Ooi, and Sai Wu. "Adaptive Logging." In SIGMOD/PODS'16: International Conference on Management of Data. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2882903.2915208.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gemmell, Jim. "Life-logging, thing-logging and the internet of things." In the 2014 workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2611264.2611276.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Sueda, Koh, Henry Been-Lirn Duh, and Jun Rekimot. "Social life logging." In the 10th asia pacific conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2350046.2350058.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Kabinna, Suhas, Cor-Paul Bezemer, Weiyi Shang, and Ahmed E. Hassan. "Logging library migrations." In ICSE '16: 38th International Conference on Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2901739.2901769.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Ferraro, Sara, Alice Meniconi, Sara Gianguzza, and Giulia Pistolesi. "TWINY emotional logging." In the 2014 ACM International Symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2641248.2641275.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Bonnie, Ron J. M., Ridvan Akkurt, Hilal Al-Waheed, Charles M. Bradford, Ramsin Y. Eyvazzdeh, E. Craig Phillips, Prabhakar Aadireddy, and Ehab Negm. "Wireline T1 Logging." In SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2003. http://dx.doi.org/10.2118/84483-ms.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zitnik, Tomislav, and Zoran Bosic. "Operations Wisdom Logging." In 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO). IEEE, 2022. http://dx.doi.org/10.23919/mipro55190.2022.9803373.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Kim, Yi-Reun, Kyu-Young Whang, and Il-Yeol Song. "Page-differential logging." In the 2010 international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1807167.1807208.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Logging"

1

Douma, M., J. A. Hunter, and R. L. Good. Borehole geophysical logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/210371.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Hunter, J. A., P. J. Kurfurst, S. M. Birk, R. A. Burns, and R L Good. Borehole Geophysical Logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1991. http://dx.doi.org/10.4095/132225.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Douma, M. Borehole geophysical logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1997. http://dx.doi.org/10.4095/299325.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Levy, G. M., and J. D. McNeill. Transient electromagnetic borehole logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123605.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Anderson, David W. EE-3A Logging Report. Office of Scientific and Technical Information (OSTI), December 1993. http://dx.doi.org/10.2172/1248147.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Anderson, David W. Addendum to Logging Report. Office of Scientific and Technical Information (OSTI), November 1995. http://dx.doi.org/10.2172/1248155.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Schreck, M., and A. H. Quatmann-Hense. Multi-Sensor Core Logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2015. http://dx.doi.org/10.4095/295971.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Morgan, Todd A., Timothy P. Spoelma, Charles E. Keegan, Alfred L. Chase, and Michael T. Thompson. Montana Logging Utilization, 2002. Ft. Collins, CO: U.S. Department of Agriculture, Forest Service, Rocky Mountain Research Station, 2005. http://dx.doi.org/10.2737/rmrs-rp-52.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Webster, B. Time domain IP borehole logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123609.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Henfling, J. A., and R. A. Normann. Precision pressure/temperature logging tool. Office of Scientific and Technical Information (OSTI), January 1998. http://dx.doi.org/10.2172/645495.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії