A protected method
-
The article focuses on analyzing and evaluating a number of situations related to the substainable production and export of agricultural products of Vietnam in the context that trade protection measures continue to increase in the current period. Using qualitative research methods such as statistics, description, comparison, contrast, synthesis and analysis, ..., the research results show that trade protection measures, especially the Non-tariff measures have been and are tending to be more diversified and more sophisticated.
15p toduongg 24-08-2024 2 2 Download
-
This research investigates the relationship between post fault transient overvoltages and the functionality of the digital distance protection. The study is conducted in a 66kV network with a neutral earth resistor as method to earth the power system. This paper begins by performing an extensive power system analysis on ground fault transient overvoltages. The study is conducted by using the PSCAD-EMTC software package.
180p runthenight07 01-03-2023 9 2 Download
-
It is essential to get information on clayey layers, which may play a significant role in protecting shallow aquifers thanks to their low hydraulic conductivity from surface contamination. One of the simple geophysical instruments is EM34 which applies the electromagnetic principle to read directly and quickly the apparent electrical conductivity of the subsurface.
6p vivacation2711 23-10-2021 20 1 Download
-
This analysis discusses about the family-based alternative care in the community for Children in Especially Difficult Circumstances (“CEDC”). Family-based alternative care is a type of social welfare that brings the CEDC or those who are at risk of losing the care from their birth parents into a temporarily stable family while waiting for a permanently stable family which might be their birth family or an adoptive family. Familybased alternative care has many advantages in comparison with the method of entrusting children into social protection facilities.
8p koxih_kothogmih5 04-09-2020 12 1 Download
-
In this article the work of the components of information of protection tools on the occurring violations, their types and the elimination of these violations and the possible trajectory of a change over time of the functioning states of information of protection tools with a discrete time are researched.
10p lucastanguyen 01-06-2020 18 3 Download
-
Poultry industry is one of the fastest growing markets. The poultry industry produces large amounts of solid waste. There are many different waste management options for poultry waste including land application of litter as an organic fertilizer, feed for livestock, biogas production, products for commercial purposes. Poultry wastes are posing serious environmental pollution problems, through offensive odours and promotion of fly and rodent breeding. The appropriate utilization of its waste or by-products increases the monetary output and protects from its unwanted side-effects.
12p cothumenhmong5 17-05-2020 33 3 Download
-
In this paper, to enhance the safety of these lines, response of a buried 56-inch diameter high pressure natural gas pipeline to a surface blast was numerically investigated. Besides, the effects of: i) explosive mass, ii) pipeline thickness, iii) burial depth and iv) concrete protective layer on pipeline deformation were parametrically studied.
20p tohitohi 19-05-2020 31 1 Download
-
Corrosion can be controlled by isolation of the metal from the corrosive environment. Isolation of corrodible metals from corrosive environments is probably the most general method of the corrosion protection afforded by paint films, sealers and lining on base materials. Fluoropolymers provide superior chemical resistance and are used in a variety of markets.
10p vihongkong2711 06-02-2020 12 2 Download
-
This study introduced a method to produce a thermosensitive nanocomposite hydrogel (nCur-PG) containing curcumin nanoparticles (nCur) which can overcome the poor dissolution of curcumin. Regarding to the method, a thermo-reversible pluronic F127-grafted gelatin (PG) play a role as surfactant to disperse and protect nanocurcumin from aggregation. The synthetic PG was identified by 1H-NMR. The obtained results via Transmission Electron Microscopy (TEM) and Dynamic Light Scattering (DLS) indicated that the size of nCur was various in the range from 1.5 ± 0.5 to 128 ± 9.
9p elandorr 03-12-2019 30 1 Download
-
This study will be achieved by aiming to: Build the analytical procedure of determination of mercury species in sediment using selective extraction technique . Assess of the reliability of the method of determination of mercury speciation in sediment. Apply the result of study to determine forms of mercury in sediment at a certain area.
27p xacxuoc4321 09-07-2019 23 6 Download
-
Technical Seminar Effective solutions for motor starting and protection presents about IEC Standard and Motor Starting Methods; effective solutions for motor starting and protection motor protection agenda; motor protection manual motor starters ms132 rated ultimate short circuit breaking capacity; main electrical parameters of motors and somethings else.
28p ducxt1995 15-05-2015 44 6 Download
-
The role of chitosan in protection of soybean from sudden death syndrome caused by Fusarium solani f. sp. glycines has many contents: introduction, methods, fungal culture and growth, evaluation of the role of chitosan in protection of soybean from SDS development, chitinase activity assay in soybean leaves, statistical analysis, eVects of chitosan as a natural antifungal agenton inhibition of the radial and submerged growth ofF. solani f. sp. glycines,...
6p cscpubka 05-05-2014 88 2 Download
-
This paper proposes an efficient division algorithm protected against simple side-channel analysis. The proposed algorithm applies equally well to software and hardware implementations. Furthermore, it does not impact the running time nor the memory requirements.
10p dunglh2013 02-04-2014 55 0 Download
-
National parks or generally protected areas (PAs) normally hold a high value as a recreational resource or destination. Though in many cases no fee or charge is made to view or enjoy natural ecosystems, people still spend time and money to reach PAs. These costs of spending (for transport, food, accommodation, time, etc.) can be calculated, and a visitation rates can be compared to expenditures. These travel costs reveals the value that people place on recreational, tourism or leisure aspects of PAs....
32p luuhuong0402 28-08-2013 66 14 Download
-
The Java standard APIs are shown in HTML output at http://java.sun.com/j2se/1.4.2/docs/api/index.html. It’s generated from the documentation comments (doc comments). Documentation comments are special comments in the source code that are delimited by the /** ... */ delimiters. The JDK contains a tool named javadoc to generate HTML documentation from documentation comments in your source file. The javadoc utility extracts information for the following items Public classes and interfaces Public and protected methods Public and protected fields Packages...
20p huanltgc00061 05-05-2013 50 3 Download
-
A penetration test, occasionally pentest, is a method of evaluating the computer security of a computer system or network by simulating an attack from malicious outsiders (who do not have an authorized means of accessing the organization's systems) and malicious insiders (who have some level of authorized access).
0p doilan 25-01-2013 60 8 Download
-
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing illegal remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice) or may subvert the system through a rootkit.
0p doilan 25-01-2013 70 10 Download
-
Jump to: navigation, search The Certified Ethical Hacker is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.) An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e.
0p doilan 25-01-2013 95 3 Download
-
Much of the C# language enables the programmer to specify declarative information about the entities defined in the program. For example, the accessibility of a method in a class is specified by decorating it with the method-modifiers public, protected, internal, and private. C# enables programmers to invent new kinds of declarative information, to specify declarative information for various program entities, and to retrieve attribute information in a run-time environment.
26p tengteng16 27-12-2011 43 3 Download
-
Paraplegia remains a potential complication of spinal cord ischemic reperfusion injury (IRI) in which oxidative stress induced cyclooxygenase activities may contribute to ischemic neuronal damage. Prolonged administration of vitamin E (α-TOL), as a potent biological antioxidant, may have a protective role in this oxidative inflammatory ischemic cascade to reduce the incidence of paraplegia. The present study was designed to evaluate the preventive value of α-TOL in IRI of spinal cord.
9p toshiba23 18-11-2011 71 5 Download