feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Online Resource  (30)
  • UB Potsdam  (27)
  • EUV Frankfurt  (6)
  • Staatliche Museen
  • Inst. Menschenrechte
Type of Medium
Language
Region
Library
Access
  • 1
    UID:
    almahu_9949863658902882
    Format: 1 online resource (152 pages)
    Edition: 1st ed.
    ISBN: 9789819742240
    Note: Intro -- Preface -- Contents -- High Sensitivity Rotating Alternating Current Field Measurement for Arbitrary-Angle Underwater Cracks -- 1 Introduction -- 2 Induced Rotating Alternating Current Field -- 2.1 RACFM Theoretical Model -- 2.2 FEM Modeling and Analyzing -- 3 RACFM System for Arbitrary-Angle Cracks Measurement -- 3.1 RACFM System -- 3.2 RACFM Probe -- 3.3 RACFM Waterproof Shell -- 4 RACFM System Testing and Discussing -- 4.1 Experiment System -- 4.2 Discussion -- 5 Conclusion -- References -- Detection of Cracks in Metallic Objects by Arbitrary Scanning Direction Using a Double U-Shaped Orthogonal ACFM Probe -- 1 Introduction -- 2 FEM Model of Double U-Shaped Orthogonal ACFM Probe -- 3 Cracks Detection Experiments -- 4 Conclusion -- References -- A Novel Fatigue Crack Angle Quantitative Monitoring Method Based on Rotating Alternating Current Field Measurement -- 1 Introduction -- 2 Theoretical Model -- 3 Finite Element Analysis -- 3.1 Model Set Up -- 3.2 Characteristic Signal Analysis of Cracks with Different Angles -- 3.3 Characteristic Signal Analysis of Cracks with Different Lengths and Depths -- 4 Experimental Setup and Result -- 4.1 Probe and System Setup -- 4.2 Crack Length Monitoring -- 4.3 Crack Depth Monitoring -- 4.4 Modification of the Measured Angle of the Crack -- 5 Conclusions and Further Work -- References -- Inspection of Both Inner and Outer Cracks in Aluminum Tubes Using Double Frequency Circumferential Current Field Testing Method -- 1 Introduction -- 2 Finite Element Method Model -- 2.1 Simulation Model -- 2.2 High Frequency Excitation Signal -- 2.3 Low Frequency Excitation Signal -- 3 Testing System -- 3.1 Probe with Sensor Arrays -- 3.2 Testing System -- 4 Inspection of Inner and Outer Cracks -- 4.1 Specimen -- 4.2 Inspection of Different Depth Cracks -- 4.3 Inspection of Different Length Cracks. , 5 Conclusions and Further Work -- References -- Novel Phase Reversal Feature for Inspection of Cracks Using Multi-frequency Alternating Current Field Measurement Technique -- 1 Introduction -- 2 Methodology -- 3 Multi-frequency ACFM Testing System -- 4 Experiment -- 5 Conclusion -- References -- Visual Reconstruction of Irregular Crack in Austenitic Stainless Steel Based on ACFM Technique -- 1 Introduction -- 2 An Irregular Crack Simulation Model -- 2.1 Simulation Model -- 2.2 Simulation Analysis of Electromagnetic Field -- 3 Visualization Reconstruction Method -- 3.1 Gradient Field Algorithm -- 3.2 Simulation Results Visualization Refactoring -- 4 Experimental Verification -- 4.1 Test System Construction -- 4.2 Experimental Test -- 4.3 Reconstruction Accuracy Evaluation -- 5 Conclusions -- References -- Visual ACFM System Modeling and Optimization for Accurate Measurement of Underwater Cracks -- 1 Introduction -- 2 Underwater VACFM -- 3 Analysis and Optimization for Probe Parameters -- 3.1 Model Development in ANSYS -- 3.2 Excitation Currents -- 3.3 Fix Structure Lift-Off -- 3.4 Probe Structure -- 4 System Performance Testing -- 4.1 Experimental System -- 4.2 Accurate Measurements -- 4.3 Results and Discussion -- 5 Design Summary and Conclusion -- References -- Research on High-Precision Evaluation of Crack Dimensions and Profiles Methods for Underwater Structure Based on ACFM Technique -- 1 Introduction -- 2 Marine Environment ACFM Simulation Model -- 3 Two-Step Interpolation Algorithm -- 4 Establishment of the Experimental System -- 5 Crack Evaluation Test -- 5.1 Crack Size Evaluation -- 5.2 Crack Profile Evaluation -- 6 Conclusion -- References.
    Additional Edition: Print version: Yuan, Xin'an Recent Development of Alternating Current Field Measurement Combine with New Technology Singapore : Springer Singapore Pte. Limited,c2024 ISBN 9789819742233
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV035059192
    Format: 1 Online-Ressource (XII, 185 S.) , Ill.
    Edition: Online-Ausgabe Springer ebook collection. Medicine 2005-2008
    ISBN: 9781846288166
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-84628-815-9
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1-8462-8815-0
    Language: English
    Subjects: Medicine
    RVK:
    RVK:
    Keywords: Herzkrankheit ; Angeborene Krankheit ; Ultraschallkardiografie
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Henein, Michael 1959-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_BV046083270
    Format: 1 Online-Ressource (viii, 107 Seiten) : , Illustrationen, Diagramme (teilweise farbig).
    ISBN: 978-981-138-707-4
    Series Statement: Lecture notes in electrical engineering volume 568
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-138-706-7
    Language: English
    Keywords: Computermusik ; Musikproduktion ; Technologie ; Musikalische Akustik ; Mathematik ; Information Retrieval ; Konferenzschrift ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Li, Wei 1943-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV048265079
    Format: 1 Online-Ressource (40 p)
    Content: Although it had a a lower income level than India in 1980, China's 2006 per capita gross domestic product stands more than twice that of India's. This paper investigates the role of the business environment in explaining China's productivity advantage using recent firm-level survey data. The analysis finds that China has better infrastructure, more skilled workers, and more labor-hiring flexibility than India, but a worse access to finance and higher regulatory burden. Infrastructure appears to be a key constraint for India: it lags significantly behind China, yet it has important indirect effects for the effectiveness of labor flexibility. Labor flexibility is also likely a major constraint for India, as evident in the predominance of small firms, the importance of firm size in accounting for India's disadvantage in productivity, and the complementarity of proxies of labor flexibility with infrastructure and access to finance. Interestingly, regulatory uncertainty has adverse effects in India but not in China. The empirical analysis suggests that it is important to consider country-specific growth bottlenecks and the indirect effects of policy reforms
    Additional Edition: Li, Wei Diagnosing Development Bottlenecks
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9947936560502882
    Format: XVIII, 910 p. 398 illus. , online resource.
    ISBN: 9783319942681
    Series Statement: Lecture Notes in Computer Science, 10874
    Content: This book constitutes the proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2018, held in Tianjin, China, in June 2018. The 59 full papers and 18 short papers presented in this book were carefully reviewed and selected from 197 submissions. The papers cover various topics such as cognitive radio networks; wireless sensor networks; cyber-physical systems; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobile cloud computing; topology control and coverage; security and privacy; underwater and underground networks; vehicular networks; internet of things; information processing and data management; programmable service interfaces; energy-efficient algorithms; system and protocol design; operating system and middle-ware support; and experimental test-beds, models and case studies.
    Note: Hypergraph Based Radio Resource Management in 5G Fog Cell -- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism -- Interest-aware next POI Recommendation for Mobile Social Networks -- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs -- Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval -- An Open Security-enhanced Compatible OpenFlow Platform -- Hop-constrained Relay Node Placement in Wireless Sensor Networks -- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection -- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications -- Delay-constraint Throughput Maximization in UAV-assisted VANETs -- Smart Device Fingerprinting based on Webpage Loading -- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain -- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality -- An Efficient Privacy-Preserving Data Aggregation Scheme for IoT -- Improving Security and Stability of AODV with Fuzzy Neural Network in VANET -- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder -- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System -- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation -- Cancer-Drug Interaction network construction and drug target prediction based on multi-source data -- Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data -- Sampling Based delta-Approximate Data Aggregation in Sensor Equipped IoT Networks -- Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model -- Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments -- iKey:An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques -- Massive MIMO Power Allocation in Millimeter Wave Networks -- A detection-resistant covert timing channel based on Geometric Huffman Coding -- Spark: A Smart Parking Lot Monitoring System -- A Hybrid Model based on Multi-Dimensional Features for Insider Threat Detection -- Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users -- A Crowdsourcing-based Wi-Fi Fingerprinting Mechanism Using Un-Supervised Learning -- Secure and Verifiable Outsourcing of Large-Scale Matrix Inverse Computation -- Household Electrical Load Scheduling Algorithms with Renewable Energy -- An Empirical Study of OAuth-based SSO System on Web -- Turning Legacy IR Devices into Smart IoT Devices -- Solving Data Trading Dilemma with Asymmetric Incomplete Information using Zero-Determinant Strategy -- Data Uploading Mechanism for Internet of Things with Energy Harvesting -- Enabling ZigBee Link Performance Robust Under Cross-Technology Interference -- Quadrant-based Weighted Centroid Algorithm for Localization in Underground Mines -- Exploration of Human Activities Using Sensing Data via Deep Embedded Determination -- Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor networks -- A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks -- Privacy-preserving Personal Sensitive Data in Crowdsourcing -- A First Step Towards Combating Fake News Over Online Social Media -- Predicting Smartphone App Usage with Recurrent Neural Networks -- A Self-Organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games -- Dealing with Dynamic-scale of Events: Compressive Data Gathering for Wireless Sensor Network -- Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks -- N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings -- Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing -- HEVC Lossless Compression Coding based on Hadamard Buttery Transformation -- U-MEC: Energy-efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks -- Localization of Thyroid Nodules in Ultrasonic Images -- Cost Reduction for Micro-grid Powered Dater Center Network with Energy Storage Devices -- An Information Classification Collection Protocol for Large-scale RFID Systems -- An efficient energy-aware probabilistic routing approach for mobile opportunistic networks -- On Association Study of Scalp EEG Data Channels Under Different Circumstances -- A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain -- Trust-distrust-aware Point-of-Interest Recommendation in Location-based Social Network -- Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query -- KrackCover: A Wireless Security Framework for Covering KRACK Attacks -- Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Network -- LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information -- NASR: NonAuditory Speech Recognition with Motion Sensors in Head-mounted Displays -- Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks -- Synergistic based Social Incentive Mechanism in Mobile Crowdsensing -- SACP:A Signcryption-based Authentication Scheme with Conditional Privacy Preservation for VANET -- DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way -- A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems -- A Novel Capability-Aware SIC-based Protocol for Wireless Networks -- A Supervised Learning Approach to Link Prediction in Dynamic Networks -- Mining Mobile Users' Interests through Cellular Network Browsing Profiles -- A Gradient-Boosting-Regression based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System -- The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers -- Network Control for Large-Scale Container Clusters -- Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks -- Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals -- A Recognition Approach for the Groups with Interactions -- Security Enhancement of Over-the-Air Update for Connected Vehicles -- Resilient SDN-based Communication in Vehicular Network -- Authentication Protocol using Error Correcting Codes and Cyclic Redundancy Check -- Understanding Data Breach: A Visualization Aspect -- A Novel Recommendation-based Trust Inference Model for MANETs.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319942674
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    b3kat_BV048269264
    Format: 1 Online-Ressource (34 p)
    Series Statement: World Bank E-Library Archive
    Content: This paper uses a new data set of 12,000 firms in China to estimate the returns to research and development investment and its spillover effects, and investigates how the returns to research and development depend on firm incentives. For the firms in the sample, the results show that on average firm output increases around 0.4 yuan for each additional 1 yuan spent on research and development in the previous year, and there is high research and development return regardless of whether the analysis deals with the endogeneity of research and development intensity. Interestingly, the marginal return to research and development is significantly higher in firms whose chief executive officers were not appointed by the government and lower when the chief executive officer's pay is directly related to annual performance. The return to research and development is higher in relatively poor regions and for firms with worse access to finance. There are also non-trivial research and development spillover effects
    Additional Edition: Erscheint auch als Druck-Ausgabe Goh, Chorching R&D Returns, Spillovers, and Firm Incentives: Evidence from China Washington, D.C : The World Bank, 2015
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    b3kat_BV048265788
    Format: 1 Online-Ressource (58 p)
    Content: This paper examines the role of firms' government connections, defined by government intervention in the appointments of Chief Executive Officers and the status of state ownership, in determining the severity of financial constraints faced by Chinese firms. In line with the previous literature, the paper demonstrates that investment by non-state firms is highly sensitive to internal cash flows, while no such sensitivity is found for government-owned enterprises. Even within the subset of non-state firms, government connections are associated with substantially less severe financial constraints (less reliance on internal cash flows to fund investment). The paper also finds that large non-state firms with weak government connections are especially financially constrained, due perhaps to the formidable hold that their state rivals have on financial resources after the "grabbing-the-big-and-letting-go-the-small" privatization program in China. Firms with government-appointed Chief Executive Officers also have significantly lower investment intensities, due perhaps to their lower-powered incentives. The empirical results suggest that government connections play an important role in explaining Chinese firms' investment behavior and financing conditions, and provide further evidence on the nature of the misallocation of credit by China's dominant state-owned banks
    Additional Edition: Cull, Robert Government Connections and Financial Constraints
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9948017361502882
    Format: XII, 544 p. 292 illus., 138 illus. in color. , online resource.
    ISBN: 9783030046484
    Series Statement: Theoretical Computer Science and General Issues ; 11280
    Content: This book constitutes the refereed proceedings of the 7th International Conference on Computational Data and Social Networks, CSoNet 2018, held in Shanghai, China, in December 2018. The 44 revised full papers presented in this book toghether with 2 extended abstracts, were carefully reviewed and selected from 106 submissions. The topics cover the fundamental background, theoretical technology development, and real-world applications associated with complex and data network analysis, minimizing in uence of rumors on social networks, blockchain Markov modelling, fraud detection, data mining, internet of things (IoT), internet of vehicles (IoV), and others. .
    Note: Theoretical technology development -- Real-world applications associated with complex and data network analysis -- Minimizing in uence of rumors on social networks -- Blockchain Markov modelling -- Fraud detection -- Data mining -- Internet of Things (IoT) -- Internet of Vehicles (IoV).
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783030046477
    Additional Edition: Printed edition: ISBN 9783030046491
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_1647716799
    Format: Online-Ressource
    ISBN: 9783504331528
    Series Statement: Juris
    Note: Enthalten in Juris : Kommentare/Bücher
    Additional Edition: Erscheint auch als Druck-Ausgabe Handbuch Personengesellschaften Köln : Schmidt, 19XX
    Language: German
    Subjects: Law
    RVK:
    Keywords: Personengesellschaft
    URL: Volltext  (lizenzpflichtig)
    Author information: Westermann, Harm Peter 1938-
    Author information: Westermann, Harry 1909-1986
    Author information: Wertenbruch, Johannes 1960-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_787717169
    Format: 1 Online-Ressource (XVI, 357 Seiten)
    ISBN: 9781614513650 , 9781614518266
    Series Statement: Language policies and practices in China volume 2
    Content: Main description: China, with the world's largest population, numerous ethnic groups, and vast geographical space, is also rich in languages. Since 2006, China's State Language Commission has been publishing annual reports on "language life" in China. These reports cover language policy and planning, new trends in language use, and major events concerning languages in mainland China, Hong Kong, Macau, and Taiwan. Now these reports are available in English.
    Content: Biographical note: Li Wei, Birkbeck College, University of London, London, UK.
    Additional Edition: ISBN 9781614513667
    Additional Edition: ISBN 9781614514008
    Language: English
    Keywords: Sprachpolitik ; Linguistik
    Author information: Li, Wei 1961-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages