Results 51 to 60 of about 27,258,963 (202)

On the Use of the Detectivity Parameter for the Condition Monitoring of Wind Turbines

open access: yesMachines
This study investigates the application of Detectivity, a composite metric derived from Hjorth’s parameters, for the condition monitoring of wind turbines.
Pasquale Grosso   +4 more
doaj   +1 more source

Method of evaporation [PDF]

open access: yes, 1987
Liquids, such as juices, milk, molten metal and the like are concentrated by forming uniformly-sized, small droplets in a precision droplet forming assembly and deploying the droplets in free fall downwardly as a central column within an evacuated column
Dufresne, Eugene R.
core   +1 more source

The Advanced BioTRIZ Method Based on LTE and MPV

open access: yesBiomimetics
While BioTRIZ is widely employed in biomimetic design to facilitate creative ideation and standardize workflows, accurately formulating domain conflicts and assessing design schemes during critical stages—such as initial concept development and scheme ...
Zhonghang Bai   +3 more
doaj   +1 more source

Verschwörungserzählungen und ihre sprachlichen Spezifika am Beispiel der Reichsbürger. Typische Textsorten und charakteristische Lexik [PDF]

open access: yesLinguistische Treffen in Wrocław
The article begins by defining the concept of conspiracy and then provides a brief overview of the history of conspiracy narratives and the current state of research.
Georg Schuppener
doaj   +1 more source

Experimental Methods

open access: yes, 2022
Abstract This chapter provides the reader with the skills to assess and design experimental research on deliberation. First, it introduces the logic and methodology of experimentation and presents the different types of experiments that are used in social science research.
Grönlund, Kimmo, Herne, Kaisa
openaire   +3 more sources

Development Of The Search Method For Non-linear Shift Registers Using Hardware, Implemented On Field Programmable Gate Arrays [PDF]

open access: yes, 2017
The nonlinear feedback shift registers of the second order inare considered, because based on them it can be developed a generator of stream ciphers with enhanced cryptographic strength.Feasibility of nonlinear feedback shift register search is analyzed.
Poluyanenko, N. (Nikolay)
core  

Chaplygin's method is Newton's method

open access: yesJournal of Mathematical Analysis and Applications, 1978
This method has been extended to ordinary differential equations in [w” by Lusin [6], to ordinary differential equations in Banach spaces by Mlak [8] and to parabolic equations by Mlak [7] and Szarki [15, Sect. 661. In each case a different type of hypotheses is assumed. A formal generalization considered by Wazewski [18] has been found by Schelkunoff [
openaire   +3 more sources

Elaboration of New Method of Deep Processing of Caro-tene-containing Raw Materials Into Nanoadditives with the Use of Cryogenic Freezing and Fine-dispersed Grinding [PDF]

open access: yes, 2016
The aim of the work is elaboration of principally new cryogenic method of deep processing of carotene-containing vegetable raw material (CCVRM) such as carrot, pumpkin, sweet Bulgarian pepper, tomato, sea buckthorn, apricot using cryogenic freezing and ...
Bilenko, L. (Leonida)   +4 more
core  

Simple and Rapid Device for Mercury Detection Based on The Formation of Mercury(II)-Dithizonate on Polytetrafluoroethylene (PTFE) Membrane [PDF]

open access: yesJournal of Pure and Applied Chemistry Research, 2019
A new analytical device for mercury detection has been developed by doping dithizone on to hydrophobic PTFE (polytetrafluoroethylene) membrane to form a blue dithizone membrane which instantaneously changed to orange color of mercury(II)-dithizonate ...
Hermin Sulistyarti   +4 more
doaj  

Home - About - Disclaimer - Privacy