Search results
From LIMSWiki
Jump to navigationJump to search
- |alt = <!-- Alternative text for images --> ...dical tissue sections, multimodal imaging systems generating hyperspectral images of tissue slices, or photometrical measurement devices for detection of par119 KB (17,262 words) - 16:27, 29 April 2024
- |alt = <!-- Alternative text for images --> ...) |url=https://codata.org/about-codata/message-from-president-merce-crosas/message-from-president-barend-mons-2018-2023/ |publisher=Committee on Data (CODATA)82 KB (11,538 words) - 22:35, 17 June 2024
- |alt = <!-- Alternative text for images --> ...st4=Ryo |last5=Tsuda |first5=Koji |date=2022-04-21 |title=Continuous black-box optimization with an Ising machine and random subspace coding |url=https://77 KB (10,372 words) - 21:33, 20 November 2023
- |alt = <!-- Alternative text for images --> ...the slide “Data.” This allows the audience to quickly grasp the take-home message so that they listen to the presenter and do not get lost in the details of93 KB (12,910 words) - 17:30, 10 August 2021
- |alt = <!-- Alternative text for images --> ...log book; (iii) display of a specimen or sample's status; (iv) viewing of box content; (v) addition of new entities, tests, categories, etc. (e.g., diagn81 KB (9,986 words) - 19:28, 5 July 2022
- |alt = <!-- Alternative text for images --> The asynchronous handling of business processes is realized in iLAP with message-driven Plain Old Java Objects (POJOs). Hence, application tasks, such as th56 KB (7,883 words) - 19:57, 19 September 2021
- |alt = <!-- Alternative text for images --> ...izes the main types of communication errors: omission, crashes, delay, and message corruption. The table shows the DQ issue derived by each problem, the root90 KB (13,287 words) - 18:28, 25 November 2019
- |alt = <!-- Alternative text for images --> ...es transmit a reject or accept message to the supply chain. If an accepted message is received, then the original traceability matrix is added to the database63 KB (8,584 words) - 02:29, 24 January 2024
- |alt = <!-- Alternative text for images --> ...ror message returned by synchronous validation is displayed in the top red box), '''(C)''' “Quarantine” status, and '''(D)''' “Validated” status (45 KB (6,605 words) - 16:58, 20 June 2017
- |alt = <!-- Alternative text for images --> ...mation on its external communications. In explanation-for-trust, the black box of the system is opened; in explanation-for-confidence, it is not.</blockqu67 KB (9,997 words) - 21:00, 19 September 2021
- |alt = <!-- Alternative text for images --> ...fic date of birth elements) were cryptographically hashed using hash-based message authentication code Secure Hash Algorithm 2 (SHA2). These privacy-preserved68 KB (9,594 words) - 18:38, 22 December 2020
- |alt = <!-- Alternative text for images --> ...latform will only be sketched at a level needed to understand this paper’s message. We refer the reader to various works of Türker ''et al.''<ref name=":4" /68 KB (9,485 words) - 21:26, 13 March 2023
- |alt = <!-- Alternative text for images --> ...model and functionality set as compared to Djeen, which works “out of the box” after a deployment from the Joomla!’s component deployment interface.42 KB (6,050 words) - 23:53, 11 January 2016
- |alt = <!-- Alternative text for images --> ...ational interviews exploring life experiences that led to these rules (see Box 1 at end).27 KB (3,596 words) - 19:30, 22 March 2017