نتایج جستجو برای: critical event
تعداد نتایج: 670493 فیلتر نتایج به سال:
Research has consistently demonstrated that testing prior to the presentation of misleading post-event information, within the context of a standard eyewitness misinformation paradigm, results in an increase in the misinformation effect. The present study investigated whether changes in misinformation susceptibility in the context of interim testing are affected by retention interval difference...
Mikhail L. KOPYTINE ∗ for The NA44 Collaboration I.Bearden, H.BØggild, J.Boissevain, L.Conin, J.Dodd, B.Erazmus, S.Esumi, C.W.Fabjan , D.Ferenc, D.E.Fields, A.Franz , J.J.GaardhØje, A.G.Hansen, O.Hansen, D.Hardtke, H. van Hecke, E.B.Holzer , T.J.Humanic, P.Hummel , B.V.Jacak , R.Jayanti, K.Kaimi, M.Kaneta, T.Kohama, M.L.Kopytine , M.Leltchouk, A.Ljubicic, Jr, B. Lörstad, N.Maeda, L.Martin, A.Me...
We consider the defect size distributions at different stages of damage evolution, from the initial stage of defect nucleation and accumulation, through the intermediate stage of defect propagation and into the final stage leading to the appearance of the major crack. Critical events considered in this context are related to (a) the formation of microcracks exceeding the structural threshold as...
Utilities are currently installing a number of resource-constrained embedded devices at the remote endpoints of their SCADA (Supervisory Control and Data Acquisition) networks as part of their smart grid rollout. These devices present a security risk for utilities: They are deployed in many different places and environments; they have very little physical security; and they have direct access b...
The complexity of safety critical systems consisting of software and hardware parts is continuously increasing. Formal methods address the issues of provably correct design offering mathematical techniques to create specifications to develop and verify safety critical systems [1]. They ensure that the implemented systems work correctly according to the defined specifications. In this paper, we ...
Phosphoinositide 3-kinases (PI-3Ks) are enzymes that generate lipid second messenger molecules, resulting in the activation of multiple intracellular signalling cascades. These events regulate a broad array of cellular responses including survival, activation, differentiation and proliferation and are now recognised to have a key role in a number of physiological and pathophysiological processe...
OBJECTIVE We evaluated the Pediatric Early Warning Score (PEWS) sensitivity as an early indicator of patients deterioration leading to a Rapid Response Team (RRT)/code event. We hypothesized that at least 80% of patients had a critical PEWS preceding the event. We determined staff awareness of deterioration in patient status prior to the event as evidenced by consults, addition of monitoring eq...
Over the past decade, local monitoring has been shown to be a powerful technique for improving security in multihop wireless sensor networks (WSNs). However, local monitoring as it is currently practiced is costly in terms of energy consumption. Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms th...
25 CRITICAL EVENT TABU SEARCH FOR MULTIDIMENSIONAL KNAPSACK PROBLEMS Fred Glover Graduate School of Business, Box 419 University of Colorado at Boulder Boulder, Colorado, 80309-0419 E-Mail: [email protected] Gary A. Kochenberger College of Business University of Colorado at Denver Denver, Colorado 80217-3364 E-Mail: [email protected] We report a new approach to creating a ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید