Suggested Topics within your search.
Suggested Topics within your search.
- History 7
- Atlases 6
- Human anatomy 6
- Social conditions 5
- methods 5
- Anesthesia 4
- Histology 4
- Women 4
- Atmospheric physics 3
- Attitude to Health 3
- Chemistry, Physical and theoretical 3
- Climatology 3
- Diseases 3
- Leadership 3
- Medicine 3
- Meteorology 3
- Politics and government 3
- atlases 3
- Behavioral Medicine 2
- Children 2
- Christianity 2
- Civilization 2
- Colonial influence 2
- Contracts 2
- Customer relations 2
- Customer services 2
- Cytodiagnosis 2
- Health 2
- Health and hygiene 2
- Manners and customs 2
-
77781
Hydrilla leafcutter moth (unofficial common name); Parapoynx diminutalis Snellen (Insecta: Lepidoptera: Crambidae)
Published 2020-05-01“…The aquatic larvae commonly attack hydrilla and other aquatic plants. The moth was identified in 1971 in India and Pakistan during scouting trips to attempt to determine potential biological control agents for hydrilla. …”
Get full text
Article -
77782
Covid-19 e infraestrutura hospitalar na Região do Araguaia Paraense
Published 2021-03-01“… O novo coronavírus tem causado impactos negativos em todo mundo, sendo que cada região merece um olhar mais atento para suas particularidades. Assim, a proposta deste trabalho é analisar a evolução do Covid-19, parte das infraestruturas hospitalares e a hierarquia urbana nos municípios do Araguaia Paraense, localizada no Sudeste do Pará, Brasil. …”
Get full text
Article -
77783
En quoi la téquila est-elle un patrimoine ?
Published 2013-01-01“…It describes the paradoxes of its production and patrimonialization, ambiguities in the law that protects its production and international monopolization, the depletion and margination of small producers of agave, the loss of biological diversity, as well as of the traditional knowledge that exists on the agave and distilled beverages. Finally, it attempts to sketch an alternative to overcome this situation.…”
Get full text
Article -
77784
Zróżnicowanie opóźnień płatniczych w przedsiębiorstwach sektora B2B krajów Europy Wschodniej
Published 2016-05-01“…Analizę oparto na danych pochodzących z raportów międzynarodowej wywiadowni gospodarczej Atriadus dotyczących przedsiębiorstw w Polsce, Słowacji, Czechach, na Węgrzech oraz w Turcji. …”
Get full text
Article -
77785
Acute Kidney Injury in Diabetes Mellitus
Published 2016-01-01“…The kidneys are severely affected as well, partly as a result of intrarenal athero- and arteriosclerosis but also due to noninflammatory glomerular damage (diabetic nephropathy). …”
Get full text
Article -
77786
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
77787
Le tourisme dans les paysages culturels des hauts plateaux du sud de la Chine
Published 2020-10-01“…Une approche des parties prenantes est appliquée pour comprendre les attitudes et les pratiques des différents agents envers les champs en terrasses et les villages traditionnels. …”
Get full text
Article -
77788
La collection de dessins français d’Isidoro Brun (1819-1898) au Museo Nacional del Prado
Published 2017-11-01“…This research on the French drawings in the Prado has also provided the possibility for new attributions. This article presents a selection of some of these new contributions.…”
Get full text
Article -
77789
On ƞǤ_Ş-Compactness
Published 2025-01-01“… Open sets may be viewed as an extension of semi-open sets by applying the notions of semi-open sets and grill nano to nGs-open sets, with the following four goals in mind: The objective is to characterize nGs-open sets by examining and proving numerous of its attributes and comments. And investigate and define new kinds of functions based on the concept of nGs-open sets, using sets of nGs-open sets, we will define a new type of Compact type and call it nGs-open compact then we will find the relationship between these new types of Compact type with nano compact. …”
Get full text
Article -
77790
FEAR PHENOMENON IN EXISTENTIAL PHILOSOPHY
Published 2017-06-01“…The author emphasizes that the fear is objectified in the culture and is amenable to the mechanism of minimization. Great attention is paid to the provocation of the depression by fear. …”
Get full text
Article -
77791
Water Quality Control and Monitoring at The Patih Drinking Water Depot Based on Nodemcu ESP32
Published 2024-12-01Get full text
Article -
77792
Effectiveness of the Palestinian Civil Police’s Accountability and Complaint System
Published 2025-01-01“…Conclusions: The study concludes that the Palestinian police should simplify the structure of the accountability and complaints system, ensure public access to accountability units, and pay particular attention to complaints filed by marginalized and vulnerable individuals, especially women, children and the physically challenged. …”
Get full text
Article -
77793
Multifocal motor neuropathy. A clinical case and literature review
Published 2023-10-01“…After laboratory tests, long-term supervision, and exclusion of other diagnoses, the patient was diagnosed with an atypical type of multifocal motor neuropathy responsive to treatment with intravenous immunoglobulin. …”
Get full text
Article -
77794
(Study on Stomach Contents of Opudi Fish (Telmatherina celebensis) in Towuti Lake, South Sulawesi)
Published 2007-07-01“…Ikan yang tertangkap (N=273) terdiri atas Jantan (141) dan betina (132), yang memiliki variasi ukuran panjang tubuh (55,8-94,7 mm). …”
Get full text
Article -
77795
Superfoods: exploring sustainability perspectives between nutrient synthesizers and accumulators
Published 2025-02-01“…Nevertheless, great attention must be paid to vegetable crops that imply an overexploitation of soil and water and induce the degradation of entire ecosystems.…”
Get full text
Article -
77796
Fatigue crack growth under remote and local compression – a state-of-the-art review
Published 2016-01-01“…With the move towards more complex, probabilistic assessments, the traditional ‘safe’ or conservative approach for prediction of fatigue crack growth rate may no longer be attractive. Current codes and standards tend to be ambiguous about the treatment of compressive stress cycles: on the one hand code guidance on fatigue crack initiation may be non-conservative, while assessment of crack propagation may be inconsistently conservative. …”
Get full text
Article -
77797
Effect of cut-off walls on submarine groundwater discharge in non-isothermal conditions
Published 2025-01-01Get full text
Article -
77798
Public acceptance in direct potable water reuse: a call for incorporating responsible research and innovation
Published 2024-12-01“…We advocate for becoming more inclusive through the `leaving ajar' approach. Particularly, attention should be paid to reflexivity and responsiveness to public concerns to ensure meaningful public engagement.…”
Get full text
Article -
77799
High-energy Neutrino Source Cross-correlations with Nearest-neighbor Distributions
Published 2025-01-01“…Effectively characterizing the spatial distribution of the neutrino samples and associating the events with astrophysical source catalogs can be challenging given the large atmospheric neutrino background and underlying non-Gaussian spatial features in the neutrino and source samples. …”
Get full text
Article -
77800
Impact Angle Control Guidance to Intercept Moving Targets by Virtual Target Technique
Published 2021-01-01“…The proposed guidance law makes the lateral acceleration of the missile converge to zero, which leads the angle of attack to zero, and it theoretically guarantees the flight path angle equals the attitude angle. …”
Get full text
Article