نتایج جستجو برای: bloom

تعداد نتایج: 8585  

2006
Fedor Nikitin

The bloom filters, as a new approach to hashing, were firstly presented by Burton Bloom [Blo70]. He considered the task of presenting a set as a sequence of bits, which is called hash code of the set. In comparison with the conventional hash-coding method, author offered another technique allowing to get more concise presentation of the set, but with some errors. There are applications in which...

2013
Ryan J. Woodland Daryl P. Holland John Beardall Jonathan Smith Todd Scicluna Perran L. M. Cook

The fate of diazotrophic nitrogen (N(D)) fixed by planktonic cyanobacteria in pelagic food webs remains unresolved, particularly for toxic cyanophytes that are selectively avoided by most herbivorous zooplankton. Current theory suggests that N(D) fixed during cyanobacterial blooms can enter planktonic food webs contemporaneously with peak bloom biomass via direct grazing of zooplankton on cyano...

Journal: :Occupational and environmental medicine 2000
M J Rodrigo M I Benavent M J Cruz M Rosell C Murio C Pascual F Morell

BACKGROUND Pigeon breeder's disease is an extrinsic allergic alveolitis in the lungs of sensitised people, caused by hypersensitivity reactions to inhaled pigeon antigens. Antigens from different sources of the animal are used for diagnostic purposes, with serum being the most widely used. Bloom is rarely used; very little is known of its antigenicity and diagnostic performance, particularly wh...

Journal: :international journal of horticultural science and technology 2015
hamideh mohammadi zahra pakkish vahidreza saffari

peach (prunus persica l. batsch.) is produced in most areas of iran, where flowering is hindered by temperature. using plant growth regulators to delay bloom is a suggestive measure to avoid frost damage. the objective of this study was to determine the effects of methyl jasmonate (mj) and salicylic acid (sa) on peach bloom delay and yield.  this study evaluated the applications of mj 0 (contro...

2012
Morgan M. Steffen Zhou Li T. Chad Effler Loren J. Hauser Gregory L. Boyer Steven W. Wilhelm

Toxic cyanobacterial blooms have persisted in freshwater systems around the world for centuries and appear to be globally increasing in frequency and severity. Toxins produced by bloom-associated cyanobacteria can have drastic impacts on the ecosystem and surrounding communities, and bloom biomass can disrupt aquatic food webs and act as a driver for hypoxia. Little is currently known regarding...

2004
R B Bhisitkul M Rizen

Aim: To describe multiple retinal abnormalities in a patient with Bloom syndrome, including early macular drusen, diabetic retinopathy, and the onset of leukaemic retinopathy. Methods: Clinical data were collected over 1 year of follow up, and ocular abnormalities in Bloom syndrome were reviewed from the literature. Results: A 39 year old man with a rare autosomal recessive ‘‘chromosome breakag...

2014
L. Wang

Article history: Received: 22.10.2013. Received in revised form: 17.1.2014. Accepted: 30.1.2014. This paper proposes a new multi-influence factors prediction method for water bloom prediction based on a remote monitor system and multi-sensor data taking into account the integrated effect of multiple influential factors along with the periodicity and random effect of environmental variables. Val...

2004
MARY DOWNES GASTRICH JUSTINE A. LEIGH-BELL CHRISTOPHER J. GOBLER MARTHA BRYAN

Blooms of the brown tide organism Aureococcus anophagefferens have recurred in the coastal bays in New Jersey since 1995 and in the coastal bays of Long Island since 1985. Intracellular viral-like particles (VLPs) were documented during 1999–2000 brown tide blooms in Little Egg Harbor, New Jersey, but it was not determined whether cells were infected during the termination of the bloom. The obj...

2013
Eung Jun Cho Choong Seon Hong Sungwon Lee Seokhee Jeon

The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery...

2011
Mikko Särelä Jörg Ott Pekka Nikander Göran Schultz

Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Mikko Särelä Name of the doctoral dissertation BloomCasting for Publish/Subscribe Networks Publisher School of Electrical Engineering Unit Department of Communications and Networking Series Aalto University publication series DOCTORAL DISSERTATIONS 49/2011 Field of research Networking Technology Manuscript submitted 14 October...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید