Showing 5,581 - 5,600 results of 14,255 for search '"containment"', query time: 0.07s Refine Results
  1. 5581

    Insect and Mite Integrated Pest Management in Florida Cotton by Joseph E. Funderburk, Nicole Casuso, Norman C. Leppla, Michael Donahoe

    Published 2017-01-01
    “…The guide includes links to additional UF/IFAS EDIS articles, as well as external sources of information on arthropod management. The guide also contains a searchable table of registered insecticides, herbicides, and fungicides for Florida cotton.­edis.ifas.ufl.edu/in1111 …”
    Get full text
    Article
  2. 5582

    “Unnatural, unnatural, unnatural, unnatural unnatural” . . . but real? The Toolbox Murders (Dennis Donnelly, 1978) and the Exploitation of True Story Adaptations by Wickham Clayton

    Published 2016-07-01
    “…This comes at the conclusion of a film which contains a number of narratological incoherencies and ideological incongruities, as is typical of exploitation films of the period. …”
    Get full text
    Article
  3. 5583

    THE ANALYSIS OF INFORMATION TECHNOLOGIES USAGE FOR ACADEMIC PURPOSES IN ENGLISH LANGUAGE TEACHING AND LEARNING AT UNIVERSITAS BANGKA BELITUNG by Herland Franley Manalu

    Published 2019-08-01
    “…The study seeks to find out the frequency and the purposes of IT usage by students and lecturers in the English learning environment. A questionnaire containing questions about the frequency and the use of IT in the teaching and learning process was disseminated to the students and the lecturers of the English Literature department at the University of Bangka Belitung. …”
    Get full text
    Article
  4. 5584

    PERAMALAN PERGERAKAN LALU LINTAS UDARA DI BANDARA INTERNASIONAL I GUSTI NGURAH RAI MENGGUNAKAN ANALISIS INTERVENSI by INDAH LARASATI WIRYANINGRUM, I WAYAN SUMARJAYA, KARTIKA SARI

    Published 2024-11-01
    “…The aim of this research is to model and forecast air traffic movements at I Gusti Ngurah Rai International Airport that contains an intervention. The intervention analysis consisted of two functions, namely the step function and the pulse function. …”
    Get full text
    Article
  5. 5585

    Viscosity model for fully liquid silicate melt by Zhang Guo-Hua, Chou Kuo-Chih

    Published 2012-01-01
    “…A model for estimating the viscosity of silicate melt as derived in our previous paper is extended to the system containing MgO, CaO, SrO, BaO, Li2O, Na2O, K2O, which can express the nonlinear variation of activation energy of viscosity with the composition. …”
    Get full text
    Article
  6. 5586

    Prediction and evaluation of residual life of casing with corrosion defects by JIA Aoyin, QIAN Liqin, WANG Jie, YANG Jingwei, WU Yaokun, WEI Mingji

    Published 2024-01-01
    “…Therefore, there is an urgent need to conduct residual life and safety evaluations of old oil field casings.MethodsBased on the von Mises equivalent stress yield criterion, a three-dimensional finite element calculation model of casings containing corrosion defects was established to analyze the influence law of corrosion pit depth and angle on casing stress distribution. …”
    Get full text
    Article
  7. 5587

    A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing by Jue-Sam Chou

    Published 2012-01-01
    “…Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, and k-out-of-n OT. …”
    Get full text
    Article
  8. 5588

    THE INFLUENCE OF CHRISTIAN EDUCATION IN CURBING RELIGIOUS CONFLICTS AND TERRORISM IN NORTHERN NIGERIA by OLAITAN OYEDELE OLAOBA, DANIEL DAMILARE ADEYINKA

    Published 2023-12-01
    “…There is a loss of values and effective Christian Education could really curb religious conflict and terrorism in the northern Nigeria and Christian Religious Education curriculum which contains Character formation would be an instrument to educate and give an orientation that enhances curbing conflicts and terrorism. …”
    Get full text
    Article
  9. 5589

    Taking Note: Challenges of Dealing with Graphical Content in TEI by Martina Scholger

    Published 2020-01-01
    “…This paper describes the ongoing development of a TEI-conformant model for the encoding of hybrid primary sources containing text and graphical components on a similar level of semantic meaning. …”
    Get full text
    Article
  10. 5590

    Une cachette d’objets de valeur des années 260 apr. J.-C. dans une villa de la cité des Nerviens (Merbes-le-Château, Belgique) by Nicolas Paridaens, Nicolas Authom, Sébastien Clerbois, Marie-Paule Delplancke, Johan van Heesch

    Published 2010-12-01
    “…It consists of two copper-allied caldrons and of a small casket containing two silver spoons, a purse with 122 silver antoniniani, a glass flask and four worn sestertii deposited on a plaque dedicated to the Danubian Riders. …”
    Get full text
    Article
  11. 5591

    Contaminants in the Urban Environment: Pharmaceuticals and Personal Care Products (PPCPs)—Part 1 by Yun-Ya Yang, Gurpal S. Toor

    Published 2015-05-01
    “… Pharmaceuticals and personal care products contain a variety of chemical substances that enter household wastewater from bath and shower, sinks, and washers and ultimately find their way into the environment. …”
    Get full text
    Article
  12. 5592

    Selected Topics on Business Information Systems Research: Editorial Introduction to Issue 26 of CSIMQ by Ben Roelens

    Published 2021-04-01
    “…Business Information Systems research deals with the conceptualization, development, introduction, maintenance and utilization of systems for computer-assisted information processing within companies and enterprise-wide networks.  This CSIMQ issue contains five articles that deal with various information system (IS) issues, including IS security, product-related ISs, blockchain technology and sensor technology. …”
    Get full text
    Article
  13. 5593

    Cuban Agriculture Before 1959: The Social Situation by José Alvarez

    Published 2004-09-01
    “…Díaz-Briquets (1983; 1986) contain useful information on several of the variables discussed in this fact sheet. …”
    Get full text
    Article
  14. 5594

    Propagation Properties of Airy Beam through Periodic Slab System with Negative Index Materials by Long Jin, Xingqiang Zhang

    Published 2018-01-01
    “…As to losses slab system contained DNMs, the smaller the collision frequencies are, the better the Airy beam quality is formed. …”
    Get full text
    Article
  15. 5595

    Integrated risk governance in the Yungui Plateau, China: The 2008 ice-snow storm disaster by Qian Ye, Ming Wang, Jiarui Han

    Published 2012-05-01
    “…Yungui Plateau in Southwestern China is regarded as one of the major bio- and cultural diversity centers in the world because it contains a remarkable variety of ecological niches and ethnic groups. …”
    Get full text
    Article
  16. 5596

    mVulSniffer: a multi-type source code vulnerability sniffer method by Xuejun ZHANG, Fenghe ZHANG, Jiyang GAI, Xiaogang DU, Wenjie ZHOU, Teli CAI, Bo ZHAO

    Published 2023-09-01
    “…Given the problem that the code slice used by existing deep learning-based vulnerability sniffer methods could not comprehensively encompass the subtle characteristics between vulnerability classes, and a single deep learning sniffer model had insufficient ability to learn long context-dependent information between cross-file and cross-function code statements, a multi-type source code vulnerability sniffer method was proposed.Firstly, fine-grained two-level slices containing the types of vulnerabilities were extracted based on the control dependency and data dependency information in program dependency graph.Secondly, the two-level slices were transformed into initial feature vector.Finally, a fusion model of deep learning vulnerability sniffer suitable for two-level slices was constructed to achieve accurate vulnerability detection of multi-type source code.The experimental results on multiple synthetic datasets and two real datasets show that the proposed method outperforms the existing multi-type source code vulnerability sniffer methods.…”
    Get full text
    Article
  17. 5597

    Research and implementation of reputation-based inter-domain routing selection mechanism by Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG

    Published 2023-06-01
    “…To solve the problem of lack of validation for exchanging messages in BGP, a inter-domain routing mechanism, which consisted of a reputation evaluation mechanism and a reputation-based BGP optimal routing algorithm, was proposed.The reputation evaluation mechanism used a distributed autonomous system (AS) alliance architecture, which divided node routing behavior in detail.The service domain and observation weight were used as indicators to quantify the impact of node behavior.By designing a feedback mechanism, the reputation value not only reflected the good and bad of nodes, but also reflected the node’s resistance to malicious attacks.The reputation-based BGP routing selection algorithm adds a “security” policy to the existing routing selection algorithm by filtering routes containing low-reputation nodes and selecting the best route among high reputation routes.The experimental results show that the proposed mechanism outperform most existing reputation mechanisms by avoiding routes with vulnerable nodes and restraining the propagation of illegal routes, thereby providing a more secure inter-domain routing environment.…”
    Get full text
    Article
  18. 5598

    Spatial Complexity of a Predator-Prey Model with Holling-Type Response by Lei Zhang, Zhibin Li

    Published 2014-01-01
    “…We focus on a spatially extended Holling-type IV predator-prey model that contains some important factors, such as noise (random fluctuations), external periodic forcing, and diffusion processes. …”
    Get full text
    Article
  19. 5599

    Pedagogical reflections from a transnational PhD course in ageing by Anne Liveng, Jeanette Eriksson, Jonas Christensen

    Published 2025-02-01
    “…It was inspired by three collaborative learning theories and contained a number of non-traditional learning activities. …”
    Get full text
    Article
  20. 5600

    Public politicians electoral potential in social media by N. A. Yushkina

    Published 2022-03-01
    “…Feedback in the accounts of current politicians was assessed, including containing critical discourse. According to the results of the study, the author concluded that the creation of a full-fledged feedback channel with a potential electorate positively affects the image of a public politician, allows reducing the feedback amount with negative comments, is a successful interaction form between a politician and the electorate and increases his electoral potential. …”
    Get full text
    Article