نتایج جستجو برای: breach flow

تعداد نتایج: 486434  

2004
Ertan Onur Cem Ersoy Hakan Deliç

In this paper, the sensing coverage area of surveillance wireless sensor networks is considered. The sensing coverage is determined by applying the Neyman-Pearson detection model and defining the breach probability on a gridmodeled field. Using a graph model for the perimeter, Dijkstra’s shortest path algorithm is used to find the weakest breach path. The breach probability is linked to paramet...

2017
Daniel Keeley David R. Sherwood

Metastasis is initiated in epithelial-derived tumors when cells at the tumor front breach the epithelial basement membrane (BM). Invasion through BMs is thought to be one of the most rate-limiting steps in cancer progression and thus is a therapeutically attractive target for halting tumor spread. Despite intense interest, it has been challenging to experimentally determine how invasive cells b...

Journal: :Law and Contemporary Problems 1989

Journal: :Proceedings on Privacy Enhancing Technologies 2018

Journal: :Materials Today 2008

2009
Yumei Wang Zhen Zhu

Knowledge workers are gradually becoming the most valuable and productive part of employees, but their intrinsic characters lead to their high turnover rate. As viewed from the theory of psychological contract, this article analyzes the flow process of knowledge workers, establishes the employee satisfaction model and finds out that one important reason inducing knowledge workers’ high turnover...

Journal: :Nature Physics 2006

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید