Results 61 to 70 of about 699,139 (244)
PENGARUH POLA PENGGERGAJIAN TERHADAP RENDEMEN DAN WAKTU MENGGERGAJI KAYU MERANTI (SHOREA SPP.) *)
The effects of sawing pattern on recovery and sawing time was studied using 72 logs of meranti (Shorea spp.). The logs were divided into 4 grades i.e., Prime, First, Second and Local, each group consisting of 18 logs.
Osly Rachman +2 more
doaj +1 more source
Wireline logging plays a critical role in coalbed methane exploration. However, the lack of crucial log data, such as neutron and sonic logs, makes coalbed methane exploration difficult.
Wan Li +4 more
doaj +1 more source
Determining Factors Behind the PageRank Log-Log Plot [PDF]
We study the relation between PageRank and other parameters of information networks such as in-degree, out-degree, and the fraction of dangling nodes. We model this relation through a stochastic equation inspired by the original definition of PageRank.
Volkovich, Yana +2 more
openaire +3 more sources
Lumber Recovery Efficiency among Selected Sawmills in Akure, Nigeria
This study was carried out to investigate the efficiency of lumber recovery among selected sawmills in Akure metropolis. Measurements were carried out before and after log conversion to estimate the volume of sawn timber and wood residues generated from ...
Samuel Oluyinka Olaniran +2 more
doaj
Bell Numbers, Log-Concavity, and Log-Convexity
Let $\{b_{k}(n)\}_{n=0}^{\infty}$ be the Bell numbers of order $k$. It is proved that the sequence $\{b_{k}(n)/n!\}_{n=0}^{\infty}$ is log-concave and the sequence $\{b_{k}(n)\}_{n=0}^{\infty}$ is log-convex, or equivalently, the following inequalities hold for all $n\geq 0$, $$1\leq {b_{k}(n+2) b_{k}(n) \over b_{k}(n+1)^{2}} \leq {n+2 \over n+1 ...
Asai, Nobuhiro +2 more
openaire +2 more sources
Occurrence of decay in aspen logs
At three Finnish match factories 1,629 aspen logs were measured (see Kärkkäinen and Salmi 1978). When the estimation was based on the condition of the butt cross section of a log, less than half of the logs were sound without any discoloration or decay.
Kärkkäinen, Matti
doaj +1 more source
Event Log Privacy Based on Differential Petri Nets
Process mining uses event logs to improve business processes, but such logs may contain privacy information. One popular research problem is the privacy protection of event logs.
Daoyu Kan, Xianwen Fang, Ziyou Gong
doaj +1 more source
Log–canonical forms and log canonical singularities
AbstractFor a normal subvarietyVof ℂnwith a good ℂ*–action we give a simple characterization for when it has only log canonical, log terminal or rational singularities. Moreover we are able to give formulas for the plurigenera of isolated singular points of such varieties and of the logarithmic Kodaira dimension ofV\{0}.
Zaidenberg, Mikhail, Flenner, Hubert
openaire +4 more sources
Determination of conversion factors for pine and spruce logs in stacks
The aim of this article was to determine the conversion factors for stacked pine and spruce logs with a length of 3–6 m. To this end, we measured stacks and their logs of a total of 3322.12 steres of pine logs and 1468.46 steres of spruce logs.
Jodłowski Krzysztof, Witkowska Joanna
doaj +1 more source
Superior prognosis stratification for stage III colon cancer using log odds of positive lymph nodes (LODDS) compared to TNM stage classification: the Japanese study group for postoperative follow-up of colorectal cancer [PDF]
Shimpei Ogawa +4 more
openalex +1 more source

