Search Data.gov
Found 268 dataset(s) matching "Exploitation".
-
This geodatabase was built to cover several geothermal targets developed by Flint Geothermal in 2012 during a search for high-temperature systems that could be exploited for electric power...
-
The Tuscarora geothermal system sits within a ~15 km wide left-step in a major west-dipping range-bounding normal fault system. The step over is defined by the Independence Mountains fault zone...
-
Slip and Dilation Tendency in focus areas Critically stressed fault segments have a relatively high likelihood of acting as fluid flow conduits (Sibson, 1994). As such, the tendency of a fault...
-
Critically stressed fault segments have a relatively high likelihood of acting as fluid flow conduits (Sibson, 1994). As such, the tendency of a fault segment to slip (slip tendency; Ts; Morris et...
-
Two papers submitted (and accepted) to the 2021 American Control Conference (ACC), both focused on different attributes of kite control in variable flow environments. Siddiqui et. al. focuses on...
-
TMI/TRMM surface soil moisture (LPRM) L3 1 day 25 km x 25 km nighttime V001 is Level 3 (gridded) data set. Its land surface parameters, surface soil moisture, land surface (skin) temperature, and...
-
The lack of efficient techniques for assessing the biological implications of microarray gene-expression data remains an important obstacle in exploiting this information. To address this need, a...
-
Background Availability of genomewide information on an increasing but still limited number of plants offers the possibility of identifying orthologues, or related genes, in species with...
-
The interaction between viruses and dendritic cells (DCs) is varied and complex. DCs are key elements in the development of a host response to pathogens such as viruses, but viruses have developed...
-
This disclosure describes three related novel methods for Recombinase-Polymerase Amplification (RPA) of a target DNA that exploit the properties of the bacterial RecA and related proteins, to...
-
Background Gene targeting would offer a number of advantages over current transposon-based strategies for insect transformation. These include freedom from both position effects...
-
In 2000, the District of Columbia City Council passed the Sex Offender Registration law. This law requires a person convicted, or found not guilty by reason of insanity, of a registration-required...
-
This Dataset identifies the FY 2024 six operational priorities designated by HSI based on law enforcement trends, ways the workforce must evolve to face emerging threats, and congressional...
-
This dataset details a two-week operation called Operation Renewed Hope II, which was led by C3's Child Exploitation Investigations Unit's Victim Identification Lab. The operation focused on...
-
This datset is about how in FY 2024, OPLA, in coordination with EOIR, implemented nationwide guidance for handling juvenile matters to ensure due process in immigration proceedings and maximize...
-
The Chandra data archive is a treasure trove for various studies, and in this study the author exploits this valuable resource to study the X-ray point source populations in nearby galaxies. By...
-
The coeval AGN and galaxy evolution and the observed local relations between super-massive black holes (SMBHs) and galaxy properties suggest some connection or feedback between SMBH growth and...
-
This table contains a catalog of 1696 X-ray sources detected in the massive star-forming region (SFR) Cygnus OB2 and extracted from two archival Chandra observations of the center of the region. A...
-
This is the eROSITA Master Catalog which has been created from information supplied to the HEASARC by the <a href="https://erosita.mpe.mpg.de/edr/eROSITAObservations/">eROSITA-DE</a>...
-
It has been known for nearly three decades that high-redshift radio galaxies exhibit steep radio spectra, and hence ultrasteep spectrum radio sources provide candidates for high-redshift radio...