Showing 1,861 - 1,880 results of 124,197 for search '"Research"', query time: 0.21s Refine Results
  1. 1861

    A Summary of N, P, and K Research with Potato in Florida by George Hochmuth, Ed Hanlon

    Published 2011-06-01
    “…Potato fertilization research has been conducted in Florida for more than sixty years. …”
    Get full text
    Article
  2. 1862
  3. 1863
  4. 1864
  5. 1865
  6. 1866
  7. 1867
  8. 1868

    Archaeological research of three caves in the Tatra Mountains in 2019-2023 by Paweł Valde-Nowak, Katarzyna Kerneder-Gubała, Magda Kowal, Julia Kościuk-Załupka, Anna Kraszewska, Kamil Makuła, Jakub Skłucki

    Published 2024-12-01
    “… This publication discusses the results of the project, which explains the mysterious lack of any traces of the Palaeolithic in the Tatra Mountains. Research undertaken in recent years in three caves – Obłazkowa and Dziura in the Polish Tatra and Hučivá diera Cave in the Slovak Tatras – have shown the destruction of sediments in Polish caves. …”
    Get full text
    Article
  9. 1869
  10. 1870
  11. 1871

    Research of Kinematics Calibration Model for the Reptiles- like Quadruped Robot by Yang Xu, Pan Chunmei, Wang Liangwen, Song Kangkang

    Published 2016-01-01
    “…A foundation for establishing relatively accurate control models of the robot is laid by the research.…”
    Get full text
    Article
  12. 1872
  13. 1873

    Research and practice on power big data security governance system by Hongbin ZHU, Long AN, Mingchen YANG

    Published 2019-11-01
    “…The blackmail attacks and data leakage problems of big data had become increasingly serious in recent years,and the state had successively issued a series of relevant laws and regulations to clarify the requirements for big data security work.Power big data assets had the characteristics of large data volume,wide distribution,high utilization value and high sensitivity.It was urgent to carry out research on big data security governance technology.Based on the analysis of the challenges faced by power big data security,the power big data security governance system was designed,the power big data security governance requirements were put forward,and the data security management and control was verified by the research and development of power big data security governance platform.…”
    Get full text
    Article
  14. 1874
  15. 1875
  16. 1876
  17. 1877

    Vulnerability identification technology research based on project version difference by Cheng HUANG, Mingxu SUN, Renyu DUAN, Susheng WU, Bin CHEN

    Published 2022-02-01
    “…The open source code hosting platform has brought power and opportunities to software development, but there are also many security risks.The open source code has poor quality, the dependency libraries of projects are complex and vulnerability collection platforms are inadequate in collecting vulnerabilities.All these problems affect the security of open source projects and complex software with open source complements and most security patches can't be discovered and applied in time.Thus, the hackers could be easily found such vulnerable software.To discover the vulnerability in the open source community fully and timely, a vulnerability identification system based on project version difference was proposed.The update contents of projects in the open source community were collected automatically, then features were defined as security behaviors and code differences from the code and log in patches, 40 features including comment information feature group, page statistics feature group, code statistics feature group and vulnerability type feature group were proposed to build feature set.And random forest model was built to learn classifiers for vulnerability identification.The results show that VpatchFinder achieves a precision rate of 0.844, an accuracy rate of 0.855 and a recall rate of 0.851.Besides, 68.07% of community vulnerabilities can be early discovered by VpatchFinder in real open source CVE vulnerabilities.This research result can improve the current issue in software security architecture design and development.…”
    Get full text
    Article
  18. 1878

    Research Progress on Tumor Treatment Strategies Targeting TGF-β by Jian ZHANG, Binyue LYU, Xiao ZHAO

    Published 2025-01-01
    “…New combination therapies, such as CAR-T therapy modified with TGF-βRII, are also emerging in clinical research. This article systematically reviews the therapeutic strategies targeting TGF-β to provide research basis and ideas for the development of drugs targeting the TGF-β pathway.…”
    Get full text
    Article
  19. 1879

    EXPLORING THE EVOLUTION OF SOCIAL LOAFING RESEARCH: A BIBLIOMETRIC PERSPECTIVE by Azeyan Awee, Yong Hooi Lim

    Published 2025-01-01
    “… This study explores various aspects of current social loafing research by sampling and analyzing behavioral science publications. …”
    Get full text
    Article
  20. 1880

    Organisational resilience: a proposal of an integrated model and research agenda by Cristina Chaves Goldschmidt, Kely César Martins de Paiva, Hélio Arthur Reis Irigaray

    Published 2019-07-01
    “…The results include a research agenda embracing methodological aspects and thematic connections, which can contribute to an expanded debate on the construct of resilience that involves differentiated levels of analysis. …”
    Get full text
    Article