نتایج جستجو برای: degrading behavior

تعداد نتایج: 635272  

2000
Perry Groot Frank van Harmelen Annette ten Teije

The overall aim of this paper is to provide a general setting for quantitative quality measures of Knowledge-Based System behavior which is widely applicable to many Knowledge-Based Systems. We propose a general approach that we call “degradation studies”: an analysis of how system output degrades as a function of degrading system input, such as incomplete or incorrect inputs. Such degradation ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد 1376

in this thesis our aim is to construct vector field in r3 for which the corresponding one-dimensional maps have certain discontinuities. two kinds of vector fields are considered, the first the lorenz vector field, and the second originally introced here. the latter have chaotic behavior and motivate a class of one-parameter families of maps which have positive lyapunov exponents for an open in...

2017
C Leopold Kurz Bernard Charroux Delphine Chaduli Annelise Viallat-Lieutaud Julien Royet

As infectious diseases pose a threat to host integrity, eukaryotes have evolved mechanisms to eliminate pathogens. In addition to develop strategies reducing infection, animals can engage in behaviors that lower the impact of the infection. The molecular mechanisms by which microbes impact host behavior are not well understood. We demonstrate that bacterial infection of Drosophila females reduc...

2006
Gautam Biswas Eric J. Manders

Integrated Systems Health Management (ISHM) provides the ability to maintain system health and performance over the life of a system. For safety-critical systems, ISHM must maintain safe operations while increasing availability by preserving functionality and minimizing downtime. This paper discusses a model-based approach to ISHM that combines fault detection, isolation and identification, fau...

Journal: :Applied and Environmental Microbiology 1993

2011
Shailendra Kumar Shrivastava Preeti Jain

Intrusion detection system is used to discover illegitimate and unnecessary behavior at accessing or manipulating computer systems. Subsequently, these behaviors are checked as an attack or normal behavior. Intrusion detection systems aim to identify attacks with a high detection rate and a low false positive. Most of the earlier IDs make use of all the features in the packet to analyze and loo...

Journal: :Acta biomaterialia 2012
Janine Jansen Martijn P Tibbe George Mihov Jan Feijen Dirk W Grijpma

Photo-crosslinked networks were prepared from fumaric acid monoethyl ester-functionalized poly(D,L-lactic acid) oligomers and N-vinyl-2-pyrrolidone. Two model proteins, lysozyme and albumin, were incorporated into the network films as solid particles and their release behavior was studied. By varying the NVP content and macromer molecular weight the degradation behavior and protein release prof...

Journal: :Journal of microbiology and biotechnology 2012
Sukhumaporn Sukkhum Shinji Tokuyama Vichien Kitpreechavanich

The optimal physical factors affecting enzyme production in an airlift fermenter have not been studied so far. Therefore, the physical parameters such as aeration rate, pH, and temperature affecting PLA-degrading enzyme production by Actinomadura keratinilytica strain T16-1 in a 3 l airlift fermenter were investigated. The response surface methodology (RSM) was used to optimize PLA-degrading en...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید