Results 21 to 30 of about 71,403 (204)
ISAT v2.0: an integrated tool for nested-domain configurations and model-ready emission inventories for WRF-AQM [PDF]
The ISAT (Inventory Spatial Allocation Tool) v2.0 is an integrated tool that has been developed to configure nested domains, downscale regional emission inventories, allocate local emission inventories, and generate model-ready emission inventories for ...
K. Wang +8 more
doaj +1 more source
Ultrasound Measurement Technique for Validation of Cryogenic Flows
An ultrasound sensor system based on the transmission-mode approach is developed to enable the monitoring and sensing of cryogenic liquids and gases—especially gaseous bubbles and gas-liquid interfaces in liquid nitrogen (LN2). Common sensors do not meet
David Becker +3 more
doaj +1 more source
Light intensity (I) fluctuates rapidly and is the most important environmental factor affecting photosynthesis. Accurate characterization of light-response curve of leaf-scale photosynthesis (PN-I curve) is fundamental for understanding PN-I relations at
Z.P. YE +7 more
doaj +1 more source
Background At-risk levels of alcohol use threaten the health of patients with HIV (PWH), yet evidence-based strategies to decrease alcohol use and improve HIV-related outcomes in this population are lacking.
E. Jennifer Edelman +17 more
doaj +1 more source
In this Part 1 of this series of articles, two iterative cycles are proposed to accurately determine the shunt resistance (Rsh), the series resistance (Rs), the ideality factor (n), the light current (Ilig), and the saturation current (Isat) of solar ...
Victor-Tapio Rangel-Kuoppa
doaj +1 more source
The Incremental Satisfiability Problem for a Two Conjunctive Normal Form [PDF]
We propose a novel method to review K ⊢ φ when K and φ are both in Conjunctive Normal Forms (CF). We extend our method to solve the incremental satisfiablity problem (ISAT), and we present different cases where ISAT can be solved in polynomial time ...
DE ITA LUNA, GUILLERMO +5 more
core +1 more source
Evaluation of Contextual and Game-Based Training for Phishing Detection
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical
Joakim Kävrestad +5 more
doaj +1 more source
Background There is growing acknowledgement of the need for a phased approach to scaling up health interventions, beginning with an assessment of ‘scalability’, that is, the capacity of an individual intervention to be scaled up.
Susan Calnan, Karen Lee, Sheena McHugh
doaj +1 more source
Itä-Suomen ammattikorkeakoulut : Yhteistyössä hyvinvoinnin osaamista edistämässä [PDF]
Pohjois-Karjalan ammattikorkeakoulu ja Savonia-ammattikorkeakoulu ovat osana ISAT-toimintaa tehneet yhteistyötä väljästi asutun alueen hyvinvointipalvelujen kehittämiseksi.
Bonet Avalos, Josep +2 more
core +3 more sources
In this Part 2 of this series of articles, the application of the iterative cycles CycleA and CycleB proposed in Part 1, to determine the solar cell parameters (the shunt resistance (Rsh), the series resistance (Rs), the ideality factor (n), the light ...
Victor-Tapio Rangel-Kuoppa
doaj +1 more source

