Mostrando 2,321 - 2,340 Resultados de 3,895 Para Buscar '"The Exploited"', tiempo de consulta: 0.05s Limitar resultados
  1. 2321
    ... nanoparticle systems exploiting the magnetic interaction (exchange or dipolar in nature) between two or more...
    Enlace del recurso
    article
  2. 2322
    ... and behavioral authentication at the same time. This method exploits the biometric authentication that measures...
    Enlace del recurso
    article
  3. 2323
    ... by means of Synthetic Aperture Radar (SAR) imagery, mainly exploiting backscatter intensities...
    Enlace del recurso
    article
  4. 2324
    ... herein mainly in terms of the raw materials sensitive to exploitation and the energy use in three stages...
    Enlace del recurso
    article
  5. 2325
  6. 2326
    por Anne Peters
    Publicado 2020
    ... approach. The social, ecological, and economic consequences of animal exploitation, notably...
    Enlace del recurso
    article
  7. 2327
  8. 2328
    ... and Exploitation Techniques and potentials (MEET) project, this study aimed to evaluate the possibility...
    Enlace del recurso
    article
  9. 2329
    ... immunotherapy becoming one of the best strategies to exploit the immune system to fight tumours....
    Enlace del recurso
    article
  10. 2330
    ... problem by exploiting a state-of-the-art deep learning framework. Experimental results compare different...
    Enlace del recurso
    article
  11. 2331
    ... of exploiting local surface curvature and streamlines for coverage path planning generalizes to other robotic...
    Enlace del recurso
    article
  12. 2332
    ... modular design model for prosumers could respond to their needs while exploiting the advantages...
    Enlace del recurso
    article
  13. 2333
    ... an approach that exploits the advantages of deep networks and shallow Grassmannian manifold networks. Inspired...
    Enlace del recurso
    article
  14. 2334
    ... intelligent autonomous hexapod robots that can exploit their biomechanics, morphology, and computational...
    Enlace del recurso
    article
  15. 2335
    ... to exploit users for advertising, extortion, and theft. Notably, most Android malware detection tools depend...
    Enlace del recurso
    article
  16. 2336
  17. 2337
  18. 2338
  19. 2339
  20. 2340
    ... of microbiological monitoring of the boar mucous membranes and ambient surfaces before and during their exploitation...
    Enlace del recurso
    article