-
41
Herbicides to Kill Invasive Trees in Home Landscapes and Surrounding Natural Areas
Published 2016-08-01“…This 5-page fact sheet is a major revision that discusses different herbicides, hand-pulling, stump grinding, foliar herbicide application, cut stump herbicide application, basal bark herbicide application, hack-and-squirt, frill, or girdle herbicide application, licenses and training, and control of specific invasive plants. …”
Get full text
Article -
42
Chrudimský Kristus a zázračné souřadnice jeho barokní legendy
Published 2009-06-01“…The result of this physical iconoclastic disgrace made on the artwork was an ineffaceable bloody hack on the temple of St. Salvator and some other transformations of his face. …”
Get full text
Article -
43
Exploring Primary Care Streaming Pathway in Emergency Departments in Saudi Arabia: A Qualitative Study
Published 2023-01-01“…Although, in one hospital, some nurses hack the system to manage the flow of patients based on their intuition. …”
Get full text
Article -
44
Blockchain technology in healthcare strengthening: The Nigerian case
Published 2024-12-01“…Blockchain technology is a distributed ledger digital system that records all transactions on a network of interconnected systems in a way that is impossible to edit or hack. When blockchain is mentioned, thoughts of cryptocurrency pop into mind, but blockchain holds vast possibilities in other facets, such as big data analytics, research, the Internet of Things, healthcare, etc. …”
Get full text
Article -
45
Ethiopian Water Hyacinth Leaf Extract as a Potential Tannery Effluent Treatment Material
Published 2022-01-01“…Treated and untreated tannery effluents were compared using standard methods such as SLC 22, SLC 8, APHA 2540C, APHA 2540D, and Hack LCK 139 to determine Cr6+, Cr3+, TDS, TSS, and TKN, respectively. …”
Get full text
Article -
46
Title not available
Published 2017-08-01“…S, Westen, A. Stein, A. Hack, A. (2010). Lanslidesusceptibility assessment using logistic regression and its comparison with a rock mass classification system, along road section in the northern Himalayas (India). …”
Get full text
Article -
47
Exploring and collecting perennial forage and grain legume crop genetic diversity in Voronezh and Tambov provinces (Results of the collecting mission, 2016)
Published 2019-06-01“…., F. valesiaca Gaudin. and F. pseudovina Hack. ex Wiesb.); a perennial form of Medicago lupulina L.; a sample of Lotus corniculatus L. found on chalky outcrops of the Kalach Hills; red (Trifolium pratense L.), golden (T. aureum Pollich.) and strawberry (T. fragiferum L.) clovers from the valley of the Khoper River; pisiform vetch (Vicia pisiformis L.) from Kalach District and hairy vetch (V. villosa Roth) from Povorino District of Voronezh Province. …”
Get full text
Article -
48
Resource potential of some species of the genus Miscanthus Anderss. under conditions of continental climate of West Siberian forest-steppe
Published 2018-08-01“…(silvergrass) comprises ca. 14–20 species including M. sacchariflorus (Maxim.) Hack., M. sinensis Anderss., M. purpurascens Anderss, and M. × giganteus, which appear to be an almost inexhaustible source of sustainable raw material, and several Miscanthus species were investigated as a potential biofuel energy crop with commercially viable way of its producing. …”
Get full text
Article -
49
Advanced methodologies and technologies in government and society /
Published 2019Table of Contents: “…Taiwo -- Young people, civic participation, and the Internet / Fadi Hirzalla, Shakuntala Banaji -- Community outreach / Loriene Roy, Antonia Frydman -- Exploring "hacking," digital public art, and implication for contemporary governance / Amadu Wurie Khan, Chris Speed -- Political context elements in public policy of radio frequency information technology and electromagnetic fields / Joshua M. …”
View in OPAC
Book -
50
Advanced methodologies and technologies in government and society /
Published 2019Table of Contents: “…Taiwo -- Young people, civic participation, and the Internet / Fadi Hirzalla, Shakuntala Banaji -- Community outreach / Loriene Roy, Antonia Frydman -- Exploring "hacking," digital public art, and implication for contemporary governance / Amadu Wurie Khan, Chris Speed -- Political context elements in public policy of radio frequency information technology and electromagnetic fields / Joshua M. …”
View in OPAC
Book -
51
الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى
Published 2019-10-01“…The present study aims at recognizing to an extreme the Arab communityis aware of how to protect their accounts and ways of penetration (hacking) ofprivacy on a general level and focusing on social engineering on particular. …”
Get full text
Article -
52
الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتأثیرها على المجتمع العربى
Published 2018-07-01“…The present study aims at recognizing to extreme the Arab community isaware of how to protect their personal accounts and ways of penetration(hacking) of privacy on general level and focusing on social engineering onparticular. …”
Get full text
Article -
53
Approaches to cyber weapons classification problem
Published 2013-04-01“…Working criteria for differentiation between information warfare and practical cyber warfare is suggested for proper classification of malware, espionage toolkits, hacking tools and combat software.…”
Get full text
Article -
54
Less-Conventional Low-Consumption Galvanic Separated MOSFET-IGBT Gate Drive Supply
Published 2017-01-01“…The supply is made while hacking a common mode type filter as a transformer, as the transformer shows a good insulation, it has a very low parasitic capacitance between primary and secondary coils, and it is cost-effective. …”
Get full text
Article -
55
Impact of Social Media on Marriage Stability in Central Division Kabale Municipality Kabale District.
Published 2025“…The study findings indicated that Hacking is identified by 21.2% of respondents as a significant challenge associated with social media use. …”
Get full text
Thesis -
56
Postcards from Inside the Practices
Published 2025-02-01“…ENRIQUE ESPINOSA PÉREZ Domestic Mediations: Tricks, Hacks, Memes, and Mattress Exchanges as Minor Architectures This multimodal article reflects on the insufficient consideration of (architectural) design as an ‘object-centered discipline’. …”
Get full text
Article -
57
Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions
Published 2018-01-01“…Communications and networks are highly vulnerable to threats because of increase in hacking. Personnel, governments, and armed classified networks are more exposed to difficulties, so the need of the hour is to install safety measures for network to prevent illegal modification, damage, or leakage of serious information. …”
Get full text
Article -
58
Laguna de fracasos
Published 2024-12-01“…We inhabit the irony of a virtuality that imposes a distance on us and at the same time it hacks all geographical borders. A practice that does not yet have a name, a performance that is always provisional, weaving voices and actions through listening and activating our own and other people’s writings. …”
Get full text
Article -
59
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01“…Through an in-depth analysis of recent research, we examine the security challenges associated with IoT-based cloud computing, including account hacking, phishing, malware, middleman attacks, and service denial. …”
Get full text
Article -
60
Nearly Quadratic n-Derivations on Non-Archimedean Banach Algebras
Published 2012-01-01Get full text
Article