Showing 41 - 60 results of 76 for search '".hack"', query time: 0.05s Refine Results
  1. 41

    Herbicides to Kill Invasive Trees in Home Landscapes and Surrounding Natural Areas by Kenneth Langeland, Stephen F. Enloe

    Published 2016-08-01
    “…This 5-page fact sheet is a major revision that discusses different herbicides, hand-pulling, stump grinding, foliar herbicide application, cut stump herbicide application, basal bark herbicide application, hack-and-squirt, frill, or girdle herbicide application, licenses and training, and control of specific invasive plants. …”
    Get full text
    Article
  2. 42

    Chrudimský Kristus a zázračné souřadnice jeho barokní legendy by Pavel Panoch

    Published 2009-06-01
    “…The result of this physical iconoclastic disgrace made on the artwork was an ineffaceable bloody hack on the temple of St. Salvator and some other transformations of his face. …”
    Get full text
    Article
  3. 43

    Exploring Primary Care Streaming Pathway in Emergency Departments in Saudi Arabia: A Qualitative Study by Marwah Hawsawi, Bayan Alilyyani

    Published 2023-01-01
    “…Although, in one hospital, some nurses hack the system to manage the flow of patients based on their intuition. …”
    Get full text
    Article
  4. 44

    Blockchain technology in healthcare strengthening: The Nigerian case by Godsave Binlak Wazhi, Nengak Precious Danladi, Sesugh Daniel Terver, Stephen Ebuka Ukaobasi

    Published 2024-12-01
    “…Blockchain technology is a distributed ledger digital system that records all transactions on a network of interconnected systems in a way that is impossible to edit or hack. When blockchain is mentioned, thoughts of cryptocurrency pop into mind, but blockchain holds vast possibilities in other facets, such as big data analytics, research, the Internet of Things, healthcare, etc. …”
    Get full text
    Article
  5. 45

    Ethiopian Water Hyacinth Leaf Extract as a Potential Tannery Effluent Treatment Material by Fitsum Etefa Ahmed, Awoke Fenta Wodag, Gemeda Gebino Gelebo, Belay Meles Gebre

    Published 2022-01-01
    “…Treated and untreated tannery effluents were compared using standard methods such as SLC 22, SLC 8, APHA 2540C, APHA 2540D, and Hack LCK 139 to determine Cr6+, Cr3+, TDS, TSS, and TKN, respectively. …”
    Get full text
    Article
  6. 46

    Title not available

    Published 2017-08-01
    “…S, Westen, A. Stein, A. Hack, A. (2010). Lanslidesusceptibility assessment using logistic regression and its comparison with a rock mass classification system, along road section in the northern Himalayas (India). …”
    Get full text
    Article
  7. 47

    Exploring and collecting perennial forage and grain legume crop genetic diversity in Voronezh and Tambov provinces (Results of the collecting mission, 2016) by L. L. Malyshev, V. F. Chapurin, T. V. Buravtseva

    Published 2019-06-01
    “…., F. valesiaca Gaudin. and F. pseudovina Hack. ex Wiesb.); a perennial form of Medicago lupulina L.; a sample of Lotus corniculatus L. found on chalky outcrops of the Kalach Hills; red (Trifolium pratense L.), golden (T. aureum Pollich.) and strawberry (T. fragiferum L.) clovers from the valley of the Khoper River; pisiform vetch (Vicia pisiformis L.) from Kalach District and hairy vetch (V. villosa Roth) from Povorino District of Voronezh Province. …”
    Get full text
    Article
  8. 48

    Resource potential of some species of the genus Miscanthus Anderss. under conditions of continental climate of West Siberian forest-steppe by O. V. Dorogina, O. Yu. Vasilyeva, N. S. Nuzhdina, L. V. Buglova, Yu. A. Gismatulina, E. V. Zhmud, G. A. Zueva, O. V. Kominа, Е. A. Tsybchenko

    Published 2018-08-01
    “…(silvergrass) comprises ca. 14–20 species including M. sacchariflorus (Maxim.) Hack., M. sinensis Anderss., M. purpurascens Anderss, and M. × giganteus, which appear to be an almost inexhaustible source of sustainable raw material, and several Miscanthus species were investigated as a potential biofuel energy crop with commercially viable way of its producing. …”
    Get full text
    Article
  9. 49

    Advanced methodologies and technologies in government and society /

    Published 2019
    Table of Contents: “…Taiwo -- Young people, civic participation, and the Internet / Fadi Hirzalla, Shakuntala Banaji -- Community outreach / Loriene Roy, Antonia Frydman -- Exploring "hacking," digital public art, and implication for contemporary governance / Amadu Wurie Khan, Chris Speed -- Political context elements in public policy of radio frequency information technology and electromagnetic fields / Joshua M. …”
    View in OPAC
    Book
  10. 50

    Advanced methodologies and technologies in government and society /

    Published 2019
    Table of Contents: “…Taiwo -- Young people, civic participation, and the Internet / Fadi Hirzalla, Shakuntala Banaji -- Community outreach / Loriene Roy, Antonia Frydman -- Exploring "hacking," digital public art, and implication for contemporary governance / Amadu Wurie Khan, Chris Speed -- Political context elements in public policy of radio frequency information technology and electromagnetic fields / Joshua M. …”
    View in OPAC
    Book
  11. 51

    الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى by د. مها أحمد ابراهیم

    Published 2019-10-01
    “…The present study aims at recognizing to an extreme the Arab communityis aware of how to protect their accounts and ways of penetration (hacking) ofprivacy on a general level and focusing on social engineering on particular. …”
    Get full text
    Article
  12. 52

    الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتأثیرها على المجتمع العربى by د. مها أحمد ابراهیم محمد

    Published 2018-07-01
    “…The present study aims at recognizing to extreme the Arab community isaware of how to protect their personal accounts and ways of penetration(hacking) of privacy on general level and focusing on social engineering onparticular. …”
    Get full text
    Article
  13. 53

    Approaches to cyber weapons classification problem by V. V. Kabernik

    Published 2013-04-01
    “…Working criteria for differentiation between information warfare and practical cyber warfare is suggested for proper classification of malware, espionage toolkits, hacking tools and combat software.…”
    Get full text
    Article
  14. 54

    Less-Conventional Low-Consumption Galvanic Separated MOSFET-IGBT Gate Drive Supply by Jean Marie Vianney Bikorimana, Alex Van den Bossche

    Published 2017-01-01
    “…The supply is made while hacking a common mode type filter as a transformer, as the transformer shows a good insulation, it has a very low parasitic capacitance between primary and secondary coils, and it is cost-effective. …”
    Get full text
    Article
  15. 55

    Impact of Social Media on Marriage Stability in Central Division Kabale Municipality Kabale District. by Ainembabazi, Georgianah

    Published 2025
    “…The study findings indicated that Hacking is identified by 21.2% of respondents as a significant challenge associated with social media use. …”
    Get full text
    Thesis
  16. 56

    Postcards from Inside the Practices by Alicia Lazzaroni, Antonio Bernacchi, Enrique Espinosa Pérez, Lydia Maria Arantes, Michele Avis Feder-Nadoff

    Published 2025-02-01
    “…ENRIQUE ESPINOSA PÉREZ Domestic Mediations: Tricks, Hacks, Memes, and Mattress Exchanges as Minor Architectures This multimodal article reflects on the insufficient consideration of (architectural) design as an ‘object-centered discipline’. …”
    Get full text
    Article
  17. 57

    Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions by Bilal Ahmad, Wang Jian, Zain Anwar Ali

    Published 2018-01-01
    “…Communications and networks are highly vulnerable to threats because of increase in hacking. Personnel, governments, and armed classified networks are more exposed to difficulties, so the need of the hour is to install safety measures for network to prevent illegal modification, damage, or leakage of serious information. …”
    Get full text
    Article
  18. 58

    Laguna de fracasos by Lagunaries

    Published 2024-12-01
    “…We inhabit the irony of a virtuality that imposes a distance on us and at the same time it hacks all geographical borders. A practice that does not yet have a name, a performance that is always provisional, weaving voices and actions through listening and activating our own and other people’s writings. …”
    Get full text
    Article
  19. 59

    A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security by Umm e Kulsoom, Syeda Faiza Nasim, Asma Qaiser, Sidra Aziz, Syeda Alishba Fatima

    Published 2024-01-01
    “…Through an in-depth analysis of recent research, we examine the security challenges associated with IoT-based cloud computing, including account hacking, phishing, malware, middleman attacks, and service denial. …”
    Get full text
    Article
  20. 60