THE STORY OF SMOKEY BEAR
نویسندگان
چکیده
منابع مشابه
Be careful what you wish for: the legacy of Smokey Bear
© The Ecological Society of America www.frontiersinecology.org F 60 years, Smokey Bear has successfully championed fire suppression in the United States, but his success has come at considerable cost. Indeed, it could be likened to the British victory over American rebels at Bunker Hill in 1775, about which it was said, “A few more such victories would surely spell ruin for the victors”. We exa...
متن کاملthe archetype of mother: a never-ending story retold by poe
investigation the archetype of mother can help the reader to understand poes works, especially his fiction, better, if not fully. motivated by internal and external drives to get into the universe in its manifold form poe was impelled to art and, from various modes of art, to symbolism. how much was poe successful to produce works of art has been a matter of dispute among critics. however, ther...
15 صفحه اولSmokey: Automatic Recognition of Hostile Messages
Abusive messages (flames) can be both a source of frustration and a waste of time for Internet users. This paper describes some approaches to flame recognition, including a prototype system, Smokey. Smokey builds a 47-element feature vector based on the syntax and semantics of each sentence, combining the vectors for the sentences within each message. A training set of 720 messages was used by ...
متن کاملthe effect of taftan pozzolan on the compressive strength of concrete in the environmental conditions of oman sea (chabahar port)
cement is an essential ingredient in the concrete buildings. for production of cement considerable amount of fossil fuel and electrical energy is consumed. on the other hand for generating one tone of portland cement, nearly one ton of carbon dioxide is released. it shows that 7 percent of the total released carbon dioxide in the world relates to the cement industry. considering ecological issu...
Smokey: A User-Based Distributed Firewall System
Traditional intranets have a central location on the network which easily allows the enforcement of a central security policy. They rely on the notion that there is one central entry point for all internal machines. Additionally, all machines that are considered logically inside the intranet reside behind the entry point. Increasingly this is not the case. We propose Smokey, a system that manag...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Forestry Chronicle
سال: 1956
ISSN: 0015-7546,1499-9315
DOI: 10.5558/tfc32183-2