نتایج جستجو برای: Mine Exploitations
تعداد نتایج: 24223 فیلتر نتایج به سال:
This descriptive analytical survey was aimed to study the negative impacts of mine exploitations carried out in the rural regions of the Tekab Township located in Iran. The statistical population of the studied areas consisted of all the heads of the rural households in the villages located in the vicinity of the mines in the Tekab Township (N=2680). According to the Cochran formula, a sample s...
this descriptive analytical survey was aimed to study the negative impacts of mine exploitations carried out in the rural regions of the tekab township located in iran. the statistical population of the studied areas consisted of all the heads of the rural households in the villages located in the vicinity of the mines in the tekab township (n=2680). according to the cochran formula, a sample s...
During any meta-heuristic search, two opposite processes are found in action, namely the explorations and exploitations. Although they might seem to operate in opposite directions, they are actually counterparts, and synergy between them may improve the final outcome of the algorithm. This is especially true for complex, high dimensional problems, because the search algorithm has to avoid many ...
Arsenopyrite-rich wastes from abandoned tungsten and tin exploitations were studied to determine the composition and characteristics of the secondary phases formed under natural weathering conditions so as to assess their potential environmental risk. Representative weathered arsenopyrite-bearing rock wastes collected from the mine dumps were analysed using the following techniques: X-ray powde...
We have conducted an empirical study of a number of computer security exploits and determined that the rates at which incidents involving the exploit are reported to the CERT can be modeled using a common mathematical framework. Data associated with three significant exploits involving vulnerabilities in phf, imap, and bind can all be modeled using the formula C = I + S pM where C is the cumula...
We present a method for detecting exploitations of vul-nerabilities in privileged programs by monitoring their execution using audit trials, where the monitoring is with respect to speciications of the security-relevant behavior of the programs. Our work is motivated by the intrusion detection paradigm, but is an attempt to avoid ad hoc approaches to codifying misuse behavior. Our approach is b...
A proper balance between global explorations and local exploitations is often considered necessary for complex, high dimensional optimization problems to avoid local optima and to find a good near optimum solution with sufficient convergence speed. This paper introduces Artificial Bee Colony algorithm with Adaptive eXplorations and eXploitations (ABC-AX), a novel algorithm that improves over th...
abstract. over the past decades, range managers have devoted extensive efforts to conserve and restore rangelands and sustain their exploitation but these efforts are more focused on the classic sciences and the exploiters' knowledge and experience have been neglected in the process. therefore, current study was done to deal with the prioritizing and comparing factors affecting rangeland exploi...
The rise of globalization and industrialization has driven the demand for rare earth metals (REMs). These are widely used in various sectors global economy with applications medicine, renewable energy, electronics, agriculture, military. REMs likely to remain an important part our future, and, as production increases, areas contaminated by expected expand over coming decades. Thus, triggering s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید