Results 71 to 80 of about 223,295 (351)

Departing from standard practices: Strategic application of value engineering in the anatomy laboratory to enhance formaldehyde extraction using high‐impact, low‐cost, and low‐maintenance solutions

open access: yesAnatomical Sciences Education, Volume 18, Issue 3, Page 241-253, March 2025.
Abstract This study describes the process of developing a high‐impact, low‐cost, and low‐maintenance air ventilation system for anatomy facilities. It employed the strategic application of Value Engineering (VE), assuring that the air ventilation system meets contemporary threshold limit values (TLVs) for formaldehyde in the working zone of dissection ...
Jürgen Russ, Niels Hammer
wiley   +1 more source

THE USE OF THE GENETIC ALGORITHM FOR SOLVING THE COOPERATION PLANNING TASK

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
The article defines the air defense units’ interaction planning task as a scheduling problem with limited resources. Offered solution is based on a heuristic method, namely on the genetic algorithm.
Dmytro V. Rieznik
doaj  

Afro‐Amerindian cosmopolitics in environmental education: A decolonial analysis of academic discourses involving the epistemological disputes around the term sustainability

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Considering the growing calls for decolonial approaches within the scope of Climate Change and Sustainability Education (CCSE), in this research we seek to understand the meanings which have been put into circulation through research narratives on Environmental Education (EE) concluded in Latin America, regarding Afro‐Amerindian knowledges ...
Danilo Seithi Kato   +1 more
wiley   +1 more source

МОДЕЛЬ РЕЄСТРАЦІЇ ВИПРОМІНЕННЯ ОПТИКО-ЕЛЕКТРОННОЮ АПАРАТУРОЮ НА РУХОМОМУ НОСІЇ

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2014
Представлені результати удосконалення моделі реєстрації оптичного випромінення, яка, на відміну від існуючих, базується на методі дискретизації енергії випромінення від району знімання (еталонного зображення).
Oleg O. Biloborodov   +3 more
doaj  

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

Regulatory Proposals for Non-seveso Establishments

open access: yesChemical Engineering Transactions
For establishments subject to the requirements of the Seveso III Directive, i.e. establishments with a high or increased risk of a major industrial accident (so-called Seveso establishments), the legal requirements set out in the Directive apply.
Agnieszka Gajek
doaj  

ДО ПИТАННЯ ПЕРСПЕКТИВ РОЗВИТКУ ОЗБРОЄННЯ І ВІЙСЬКОВОЇ ТЕХНІКИ, ТАКТИКИ ЗЕНІТНИХ РАКЕТНИХ ВІЙСЬК

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
На основі аналізу розвитку засобів повітряно-космічного нападу, зміни форм і способів їх застосування пропонуються можливі напрями подальшого розвитку тактики зенітних ракетних військ.
Mykhailo A. Levchenko   +1 more
doaj  

Prioritization of hazards by means of a QFD-based procedure [PDF]

open access: yes, 2018
Despite the evolution of regulations in the field of occupational health and safety promoted in EU countries, the number of accidents and victims has not significantly decreased in recent years, especially in constructions and agriculture sectors, as ...
Fargnoli, Mario, Lombardi, Mara
core   +1 more source

THE METHOD OF FORMATION AND CONTROL OF INTERGATED COUNETERACTION POTENTIAL AGAINST MILITARY THREATS TO PROVIDE A CERTAIN LEVEL OF STATE MILTARY SECURITY

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2018
The method of formation and control of integrated counteraction potential against military threats is studied in order to provide a certain level of state military security, which is based on the method of expert intermediate scenarios, enhanced ...
Vladimir Y. Bohdanovych   +2 more
doaj  

Home - About - Disclaimer - Privacy