نتایج جستجو برای: critical event

تعداد نتایج: 670493  

2017
Ayanna K. Thomas Leamarie T. Gordon Paul M. Cernasov John B. Bulevich

Research has consistently demonstrated that testing prior to the presentation of misleading post-event information, within the context of a standard eyewitness misinformation paradigm, results in an increase in the misinformation effect. The present study investigated whether changes in misinformation susceptibility in the context of interim testing are affected by retention interval difference...

2001
Mikhail L. KOPYTINE

Mikhail L. KOPYTINE ∗ for The NA44 Collaboration I.Bearden, H.BØggild, J.Boissevain, L.Conin, J.Dodd, B.Erazmus, S.Esumi, C.W.Fabjan , D.Ferenc, D.E.Fields, A.Franz , J.J.GaardhØje, A.G.Hansen, O.Hansen, D.Hardtke, H. van Hecke, E.B.Holzer , T.J.Humanic, P.Hummel , B.V.Jacak , R.Jayanti, K.Kaimi, M.Kaneta, T.Kohama, M.L.Kopytine , M.Leltchouk, A.Ljubicic, Jr, B. Lörstad, N.Maeda, L.Martin, A.Me...

2004
A. M. Korsunsky

We consider the defect size distributions at different stages of damage evolution, from the initial stage of defect nucleation and accumulation, through the intermediate stage of defect propagation and into the final stage leading to the appearance of the major crack. Critical events considered in this context are related to (a) the formation of microcracks exceeding the structural threshold as...

2014
Jason Reeves Sean Smith

Utilities are currently installing a number of resource-constrained embedded devices at the remote endpoints of their SCADA (Supervisory Control and Data Acquisition) networks as part of their smart grid rollout. These devices present a security risk for utilities: They are deployed in many different places and environments; they have very little physical security; and they have direct access b...

2013
Faezeh Siavashi Marina Waldén Leonidas Tsiopoulos Jüri Vain

The complexity of safety critical systems consisting of software and hardware parts is continuously increasing. Formal methods address the issues of provably correct design offering mathematical techniques to create specifications to develop and verify safety critical systems [1]. They ensure that the implemented systems work correctly according to the defined specifications. In this paper, we ...

Journal: :Respiratory Research 2000
Alison M Condliffe Karen A Cadwallader Trevor R Walker Robert C Rintoul Andrew S Cowburn Edwin R Chilvers

Phosphoinositide 3-kinases (PI-3Ks) are enzymes that generate lipid second messenger molecules, resulting in the activation of multiple intracellular signalling cascades. These events regulate a broad array of cellular responses including survival, activation, differentiation and proliferation and are now recognised to have a key role in a number of physiological and pathophysiological processe...

Journal: :Pediatrics 2010
Mari Akre Marsha Finkelstein Mary Erickson Meixia Liu Laurel Vanderbilt Glenn Billman

OBJECTIVE We evaluated the Pediatric Early Warning Score (PEWS) sensitivity as an early indicator of patients deterioration leading to a Rapid Response Team (RRT)/code event. We hypothesized that at least 80% of patients had a critical PEWS preceding the event. We determined staff awareness of deterioration in patient status prior to the event as evidenced by consults, addition of monitoring eq...

2014
S. Kavitha S. Lalitha

Over the past decade, local monitoring has been shown to be a powerful technique for improving security in multihop wireless sensor networks (WSNs). However, local monitoring as it is currently practiced is costly in terms of energy consumption. Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms th...

2008
Fred Glover

25 CRITICAL EVENT TABU SEARCH FOR MULTIDIMENSIONAL KNAPSACK PROBLEMS Fred Glover Graduate School of Business, Box 419 University of Colorado at Boulder Boulder, Colorado, 80309-0419 E-Mail: [email protected] Gary A. Kochenberger College of Business University of Colorado at Denver Denver, Colorado 80217-3364 E-Mail: [email protected] We report a new approach to creating a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید