نتایج جستجو برای: underground works

تعداد نتایج: 128573  

2008
Rebecca S. Betjemann Erik G. Willcutt Richard K. Olson Janice M. Keenan John C. DeFries Sally J. Wadsworth

Longitudinal twin data were analyzed to investigate the etiology of the stability of genetic and environmental influences on word reading and reading comprehension, as well as the stability of those influences on their relationship. Participating twin pairs were initially tested at a mean age of 10.3 years, and retested approximately five years later. Both word reading and comprehension were fo...

2010
Huanhuan Chen Anthony G. Cohn

In the UK and many other countries, underground networks are used to deliver a range of services to households and industries. Maintaining and upgrading these networks are major undertakings. In order to avoid unnecessary holes dug in wrong places, prior to invasive works it is normally required that excavators should request and obtain record information from all relevant utilities to identify...

2007
David DUBOIS

These last years have pointed out a significant increase of the power that needs to be transported by underground power cables. As a consequence, large cross section conductors, up to 2500mm2 are now customarily used. The CIGRE group B1-03 has completed in 2005 a work that analyses the actual AC resistance of these large cross section conductors as a function of their design. The authors discus...

2013
Yuan Li Hongxiong Guo Zhenghui Xu Xiaotao Zhou Hailong Zhang Lijie Zhang Jing Miao Yi Pan

BACKGROUND Between September 17 and October 3, 2009, hundreds of workers employed in a manufacturing factory in Shenzhen, a city in south China developed a sudden onset of acute gastroenteritis. A retrospective cohort study is designed to identify the risk factors and control this outbreak. METHODS Information on demographic characteristics, working place, the history of contact with a person...

2018
Mehmet C. Vuran Abdul Salam Rigoberto Wong Suat Irmak

The projected increases in World population and need for food have recently motivated adoption of information technology solutions in crop fields within precision agriculture approaches. Internet of underground things (IOUT), which consists of sensors and communication devices, partly or completely buried underground for real-time soil sensing and monitoring, emerge from this need. This new par...

2014
T. Makkonen

In underground mines and tunnels accurate and continuous positioning of moving machines and humans has been studied extensively. Geomagnetic field based positioning is an interesting possibility for this measurement need. Using a commercial smart phone and a new calculation service provided by a Finnish company, a feasibility and accuracy assertion tests were done in Finnish underground mine. F...

Journal: :Foundations and Trends in Networking 2012
Zhi Sun Ian F. Akyildiz

Wireless Underground Sensor Networks (WUSNs) are the networks of wireless sensors that operate in the underground soil medium. In this monograph, to realize reliable and efficient WUSNs, two enabling techniques are developed to address the challenges brought by the underground soil medium, including the EM wave-based WUSNs and the MI-based WUSNs. For EM wave-based WUSNs, the heterogeneous netwo...

Journal: :The Annals of occupational hygiene 2010
Winthrop F Watts David D Gladis Matthew F Schumacher Adam C Ragatz David B Kittelson

A low cost, battery-operated, portable, real-time aerosol analyzer is not available for monitoring diesel particulate matter (DPM) concentrations in underground mines. This study summarizes a field evaluation conducted at an underground limestone mine to evaluate the potential of the TSI AM 510 portable photometer (equipped with a Dorr-Oliver cyclone and 1.0-mum impactor) to qualitatively track...

2016
Weifeng Li Junming Yin Hsinchun Chen

Over the years, cybercriminals increasingly joined the underground economy to exchange malicious services for conducting data breaches crimes. As many service providers are rippers, most cybercriminals rely on a few high quality services. To this end, cybercriminals post customer reviews evaluating the purchase experience and the service quality. To identify high quality services, researchers f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید