Showing 1,341 - 1,360 results of 1,537 for search 'log processing', query time: 0.09s Refine Results
  1. 1341

    Design and Implementation of a Production Forest Monitoring Information System in Central Sulawesi Province by Syahrullah Syahrullah, Abdul Mahatir Najar, Hajra Rasmita Ngemba, Syaiful Hendra

    Published 2025-03-01
    “…Kesatuan Pengelola Hutan (KPH) Dolago Tanggunung, as one of the production forest managers in Central Sulawesi, faces serious challenges such as illegal logging, forest encroachment, and a high risk of forest fires. …”
    Get full text
    Article
  2. 1342

    Exploring AI to automate EFL corrective written feedback in the first language by Rob Hirschel, Kayoko Horai

    Published 2025-03-01
    “…The classroom intervention on which this study is based had four main steps: a) individual or collective brainstorming and vocabulary search (5 minutes), b) subsequent free-writing activity in an online browser (10 minutes), c) reading the ChatGPT feedback in L1 Japanese (5 minutes), d) completing paper error logs to process feedback (5 minutes). Data was collected from students’ written submissions as well as the ChatGPT-generated feedback, students’ error logs, and surveys administered to students after each activity and at the end of the semester. …”
    Get full text
    Article
  3. 1343

    Recent Advances in the Use of Drill Cuttings for Determining Subduction Zone Structure, Stratigraphy, and Stress State by P. H. Cornard, A. M. Schleicher, C. Regalla, M. Hamahashi, M. Kitamura, R. Fukuchi, K. T. Pickering, H. Kitajima, T. Wiersberg

    Published 2025-05-01
    “…Combining these data with logging‐while‐drilling and mud gas logging data permits the generation of depth profiles of lithological variation and deformation structures. …”
    Get full text
    Article
  4. 1344

    The results of scientific research of Bryansk State University in 2023 in the field of rope technologies development for various sectors of the economy by Goncharov K.A.

    Published 2024-03-01
    “…The results of the creation of scientifically based methods for their design and computer modeling of operational processes are also presented. The article describes the results of the creation of a theory of design and modeling of work processes for harvesters equipped with rope anchoring equipment for logging operations when working on steep slopes in highly rugged or mountainous terrain.…”
    Get full text
    Article
  5. 1345

    The results of Bryansk State University scientific research in 2022 in the field of creation of mobile ropeways and forest rope units based on self-propelled wheeled chassis by Stepchenko T.A., Babich O.V.

    Published 2023-03-01
    “…Petrovskii Bryansk State University in the field of developing promising domestic designs of mobile aerial rope systems of various functional purposes — mobile ropeways based on self-propelled wheeled chassis of high load capacity and cross-country ability, airmobile cable cars based on container and frame rope installations transported by air transport, forest rope units for logging. The description of the developed mathematical models and methods of modeling work processes during the operation of the specified rope equipment, including the creation of digital twins, traction calculation, analysis of dynamic processes, maintenance planning, etc. is given.…”
    Get full text
    Article
  6. 1346

    Issues of identity verification of typical applications over mobile terminal platform by Xiaolin ZHANG, Dawu GU, Chi ZHANG

    Published 2020-12-01
    “…Recent studies have shown that attacks against USIM card are increasing,and an attacker can use the cloned USIM card to bypass the identity verification process in some applications and thereby get the unauthorized access.Considering the USIM card being cloned easily even under 5G network,the identity verification process of the popular mobile applications over mobile platform was analyzed.The application behaviors were profiled while users were logging in,resetting password,and performing sensitive operations,thereby the tree model of application authentication was summarized.On this basis,58 popular applications in 7 categories were tested including social communication,healthcare,etc.It found that 29 of them only need SMS verification codes to get authenticated and obtain permissions.To address this issue,two-step authentication was suggested and USIM anti-counterfeiting was applied to assist the authentication process.…”
    Get full text
    Article
  7. 1347

    Spatial distribution prediction of pore pressure based on Mamba model by Xingye Liu, Xingye Liu, Bing Liu, Wenyue Wu, Qian Wang, Yuwei Liu

    Published 2025-04-01
    “…Initially, the deep learning model is trained and optimized by collecting and analyzing well-logging data, including key parameters such as acoustic time difference and density. …”
    Get full text
    Article
  8. 1348

    Distribution of Remaining Oil and Enhanced Oil Recovery Strategy for Carboniferous Buried-Hill Reservoirs in Junggar Basin by Qijun Lv, Zhaowen Shi, Linsong Cheng, Chunjing Zan

    Published 2025-05-01
    “…To more reasonably study the reservoir development process and establish an optimal development plan, a machine learning model for fracture density was trained using imaging logging interpretation results and conventional logging curve data. …”
    Get full text
    Article
  9. 1349

    Anomaly Detection Dataset for Industrial Control Systems by Alireza Dehlaghi-Ghadim, Mahshid Helali Moghadam, Ali Balador, Hans Hansson

    Published 2023-01-01
    “…This paper introduces the ‘ICS-Flow’ dataset, which offers network data and process state variables logs for supervised and unsupervised ML-based IDS assessment. …”
    Get full text
    Article
  10. 1350

    Impact of landscape disturbance on butterfly communities: Diversity, distance dependence, and neutral model predictions by Daniel F.R. Cleary, Anna M. Bijlmer, Dille Wielakker, Nicole J. de Voogd

    Published 2025-06-01
    “…Recent theoretical work suggests that rainforest biotas are not primarily structured by environmental determinism but rather by stochastic processes. We sampled butterflies from primary and disturbed (logged, and burnt) forest landscapes and compared diversity, examined geographic distance and dissimilarity relationships, and tested for deviations from neutral model predictions. …”
    Get full text
    Article
  11. 1351

    A Proposed Agent System for Network Monitoring by Baghdad Science Journal

    Published 2014-06-01
    “…All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. …”
    Get full text
    Article
  12. 1352

    Unified Ecosystem for Data Sharing and AI-Driven Predictive Maintenance in Aviation by Igor Kabashkin, Vitaly Susanin

    Published 2024-11-01
    “…This paper introduces a unified ecosystem for data sharing and AI-driven predictive maintenance designed to address these challenges by integrating real-time and historical data from diverse sources, including aircraft sensors, maintenance logs, and operational records. The proposed ecosystem enables predictive analytics and anomaly detection, enhancing decision-making processes for airlines, maintenance, repair, and overhaul providers, and regulatory bodies. …”
    Get full text
    Article
  13. 1353

    Sylph: An Unsupervised APT Detection System Based on the Provenance Graph by Kaida Jiang, Zihan Gao, Siyu Zhang, Futai Zou

    Published 2025-07-01
    “…Sylph proposes a whole-process architecture from provenance graph collection to anomaly detection, starting from the system audit logs, and dividing subgraphs based on time slices of the provenance graph it transforms into to reduce memory overhead. …”
    Get full text
    Article
  14. 1354

    Laboratory experiment on interlayer and intralayer interference in offshore sandy conglomerate reservoir by LUO Xianbo

    Published 2024-02-01
    “…In practice, interference data are primarily obtained from production logging, which shows that the interference coefficient changes with the development stage and over time. …”
    Get full text
    Article
  15. 1355

    The use of Geographic Information Systems as innovative tools for sustainable development strategies and enhancing the efficiency of forest sector entities by Lutsiv Nataliia, Pavlo Chukhna

    Published 2024-10-01
    “…The intensive logging scenario showed the potential for rapidly achieving high profitability, but it showed a 35% reduction in carbon accumulation and a 50% decrease in forest biodiversity. …”
    Get full text
    Article
  16. 1356

    Expansão da rede viária na Amazônia Oriental, Rodovia Perimetral Norte, Amapá by Francinete da Silva Facundes, Ricardo Ângelo Pereira Lima, Valdenira Ferreira dos Santos

    Published 2019-12-01
    “…This article deals with the multitemporal analysis of the network of roads in the Northern Perimetral Highway, Amapá State, Brazil, in order to understand the process of territorial occupation along the area. …”
    Get full text
    Article
  17. 1357

    Playing in assistance to children with deficiencies: a reflection on cultural production in childhood by Marisa Takatori, Edda Bomtempo, Fernanda de Souza Dalti Pereira, Luana Wang Lin, Luciana Orui Bansi, Ricardo Lopes Correia

    Published 2010-04-01
    “…This article aims to discuss activities done by a boy with deficiencies during the process of occupational therapy, seeing these as singular cultural productions and expression of subjectivity. …”
    Get full text
    Article
  18. 1358

    A coleta da erva-mate pela população cabocla do Vale do Rio do Peixe e Oeste de Santa Catarina: apropriação privada da terra e rupturas (décadas de 1900 a 1940) / The harvest of er... by Marlon Brandt, Naiara Sampaio Silva

    Published 2014-12-01
    “…The article aims to analyze the extraction of erva-mate (Ilex paraguariensis) by caboclo populations in the Western forests of Santa Catarina State, the private land appropriation processes and the disarticulation of the extractive practice of the private land appropriation processes, which becomes more intense from the First Republic decades on. …”
    Get full text
    Article
  19. 1359

    Desertification and Environmental Vulnerability. Preface by Dimitra Rapti-Caputo, Massimo Iannetta

    Published 2010-10-01
    “…It is used rather to refer to a process resulting from anthropocentric and natural factors, such as land over-exploitation, overgrazing, mechanized farming, bad irrigation practices, illegal and excessive logging, bush and forest fires and deforestation due to population increase; along with these human activities, a range of climatic factors are believed to influence the process of land degradation (year-round aridity, high variability in rainfall, recurrent drought and so on). …”
    Get full text
    Article
  20. 1360

    Factors Affecting the Quality of Internship among Public Health Students in Iran: A Narrative Review Study by MoradAli Zareipour, Masoumeh Abazari, Mohammad Saeed Fattahi Ardakani, Mojtaba Jadgal

    Published 2025-05-01
    “…At the conclusion of the study screening process, the findings from eight articles were included in the data analysis. …”
    Get full text
    Article