نتایج جستجو برای: radiation mitigation
تعداد نتایج: 270118 فیلتر نتایج به سال:
Performance Evaluation of Threshold-Based TOA Estimation Techniques Using IR-UWB Indoor Measurements
Ultra-wide bandwidth (UWB) technology is a viable candidate for enabling accurate localization through time of arrival (TOA) based ranging techniques. These ranging techniques exploit the high time resolution of the UWB signals to estimate the TOA of the first signal path. Nevertheless, these techniques are facing the problem of proper multipath mitigation especially in harsh propagation enviro...
In emergency and crisis situations (ECS) like earthquakes, tsunamis, terrorist attacks, it is very important that communication facilities are operative to provide services both to rescue teams and civilians. In ECS it is very common that communication premises are often unable to provide services, either due to physical damages or traffic overload. In such a case there is the need for rapid re...
Large oceanic migrants play important roles in ecosystems, yet many species are of conservation concern as a result of anthropogenic threats, of which incidental capture by fisheries is frequently identified. The last large populations of the leatherback turtle, Dermochelys coriacea, occur in the Atlantic Ocean, but interactions with industrial fisheries could jeopardize recent positive populat...
Radon gas is the second leading cause of lung cancer, causing thousands of deaths annually. It can be a problem for people or animals in houses, workplaces, schools or any building. Therefore, its mitigation has become essential to avoid health problems and to prevent radon from interfering in radioactive measurements. This study describes the implementation of radon mitigation systems at a rad...
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321 1. GOALS OF CORPORATE LIABILITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 A. Corporate Deterrence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 B. Using Liability to Induce Corp...
this study aims to examine how iranian efl learners perceive and apply mitigation devices in request speech act in 4 asymmetrical situations. role-play interactions and questionnaires were used to elicit the required data from iranian informants (male vs. female). the results obtained from the analysis of data revealed that in identical situations, male requestors were comparably more certain t...
SQL injection attacks (SQLIA) still remain one of the most commonly occurring and exploited vulnerabilities. A considerable amount of research concerning SQLIA mitigation techniques has been conducted with the primary resulting solution requiring developers to code defensively. Although, defensive coding is a valid solution, the current market demand for websites is being filled by inexperience...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید