Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1
zadetkov: 10
1.
  • Morphological Data Sets Fit... Morphological Data Sets Fit a Common Mechanism Much More Poorly than DNA Sequences and Call Into Question the Mkv Model
    Goloboff, Pablo A.; Pittman, Michael; Pol, Diego ... Systematic biology, 05/2019, Letnik: 68, Številka: 3
    Journal Article
    Recenzirano

    The Mkv evolutionary model, based on minor modifications to models of molecular evolution, is being increasingly used to infer phylogenies from discrete morphological data, often producing different ...
Celotno besedilo
Dostopno za: BFBNIB, DOBA, IZUM, KILJ, NMLJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
2.
  • Mining Gold and Manufacturi... Mining Gold and Manufacturing Ignorance
    McCulloch, Jock; Miller, Pavla 2023, 2023-03-20
    eBook
    Odprti dostop

    This open access book charts how South Africa’s gold mines have systematically suppressed evidence of hazardous work practices and the risks associated with mining. For most of the twentieth century, ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
3.
  • New fuzzy neural network-Ma... New fuzzy neural network-Markov model and application in mid- to long-term runoff forecast
    Shi, Biao; Hu, Chang Hua; Yu, Xin Hua ... Hydrological sciences journal, 04/2016, Letnik: 61, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, a mid- to long-term runoff forecast model is developed using an ideal point fuzzy neural network-Markov (NFNN-MKV) hybrid algorithm to improve the forecasting precision. Combining the ...
Celotno besedilo
Dostopno za: BFBNIB, GIS, IJS, IZUM, KILJ, KISLJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK

PDF
4.
  • Experimental Analysis for t... Experimental Analysis for the Best Selection of Video Containers and Codecs
    Nokandeh, Hossein Jahanshahi; Malekzadeh, Mina; Roeinfard, Faezeh Journal of educational multimedia and hypermedia, 2021, Letnik: 30, Številka: 1
    Journal Article
    Recenzirano

    As the technology is achieving a non-feasible zenith of complexity and quality in video, it is important to maintain the related size of each file at a low level to be able to run the video on ...
Preverite dostopnost
5.
  • “A bit more truthful”: the ... “A bit more truthful”: the validity of adolescent sexual behaviour data collected in rural northern Tanzania using five methods
    Plummer, M L; Ross, D A; Wight, D ... Sexually transmitted infections, 12/2004, Letnik: 80, Številka: suppl 2
    Journal Article
    Recenzirano
    Odprti dostop

    Objective: To assess the validity of sexual behaviour data collected from African adolescents using five methods. Methods: 9280 Tanzanian adolescents participated in a biological marker and face to ...
Celotno besedilo
Dostopno za: CMK, NUK, UL, UM, UPUK

PDF
6.
  • Estimating trees from filte... Estimating trees from filtered data: Identifiability of models for morphological phylogenetics
    Allman, Elizabeth S.; Holder, Mark T.; Rhodes, John A. Journal of theoretical biology, 03/2010, Letnik: 263, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    As an alternative to parsimony analyses, stochastic models have been proposed ( Lewis, 2001; Nylander et al., 2004) for morphological characters, so that maximum likelihood or Bayesian analyses may ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK

PDF
7.
Celotno besedilo

PDF
8.
  • A Multi-information Particle Swarm Optimization Algorithm for Weapon Target Assignment of Multiple Kill Vehicle
    Yang, Liman; Zhai, Zhuangzhuang; Li, Yunhua ... 2018 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM), 2018-July
    Conference Proceeding

    Multiple Kill Vehicle (MKV) is a new type of ballistic missile interceptor composed of a carry vehicle and multiple kill vehicles to intercept incoming targets during the midcourse phase. During the ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
9.
Preverite dostopnost
10.
  • A Practical Steganographic ... A Practical Steganographic Approach for Matroska Based High Quality Video Files
    Pitropakis, N.; Lambrinoudakis, C.; Geneiatakis, D. ... 2013 27th International Conference on Advanced Information Networking and Applications Workshops, 2013-March
    Conference Proceeding

    Several steganographic algorithms have been proposed for protecting message secrecy against unauthorized "reads". The most used method for hiding a message relies on embedding the secret message in ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
1
zadetkov: 10

Nalaganje filtrov