Characterization of Deep Tunneling Activity Through Remote‐Sensing Techniques

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tunneling through weak interactions: comparison of through-space-, H-bond-, and through-bond-mediated tunneling.

Results from ab initio electronic structure theory calculations on model systems allow for the detailed comparison of tunneling through covalently bonded contacts, hydrogen bonds, and van der Waals contacts. Considerable geometrical sensitivity as well as an exponential distance dependence of the tunneling is observed for tunneling through various nonbonded contacts. However, the fundamental re...

متن کامل

Submucosal tunneling techniques: current perspectives

Advances in endoscopic submucosal dissection include a submucosal tunneling technique, involving the introduction of tunnels into the submucosa. These tunnels permit safer offset entry into the peritoneal cavity for natural orifice transluminal endoscopic surgery. Technical advantages include the visual identification of the layers of the gut, blood vessels, and subepithelial tumors. The creati...

متن کامل

Tunneling through cells

It takes two to regulate T wo isoforms of the IκB inhibitor of NF-κB are required to turn oscillation into steady regulation during chronic stimulation, according to Kearns et al. (page 659). The use of two out-of-phase regulators may be a common means to control signaling pathways. NF-κB activation triggers expression of IκBα, which leads to down-regulation of the signaling pathway and a decre...

متن کامل

Tunneling Through Inner Space

It is common but perhaps misguided to provide extensibility for a layer X header in the layer X header. Strawman principle: In a middlebox world, it is both more principled and more pragmatic to extend the layer X header within layer X + 1 (i.e. within the payload encapsulated by the layer X header). For instance, extensions to the IP header should not be located in a chain of extensions to the...

متن کامل

Video pornography detection through deep learning techniques and motion information

Recent literature has explored automated pornographic detection – a bold move to replace humans in the tedious task of moderating online content. Unfortunately, on scenes with high skin exposure, such as people sunbathing and wrestling, the state of the art can have many false alarms. This paper is based on the premise that incorporating motion information in the models can alleviate the proble...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Environmental and Engineering Geophysics

سال: 1997

ISSN: 1083-1363,1943-2658

DOI: 10.4133/jeeg2.2.143