Showing 77,781 - 77,800 results of 81,006 for search 'AT*', query time: 0.36s Refine Results
  1. 77781

    Hydrilla leafcutter moth (unofficial common name); Parapoynx diminutalis Snellen (Insecta: Lepidoptera: Crambidae) by Julie Baniszewski, Emma N.I. Weeks, James P. Cuda

    Published 2020-05-01
    “…The aquatic larvae commonly attack hydrilla and other aquatic plants. The moth was identified in 1971 in India and Pakistan during scouting trips to attempt to determine potential biological control agents for hydrilla. …”
    Get full text
    Article
  2. 77782

    Covid-19 e infraestrutura hospitalar na Região do Araguaia Paraense by Tarciso Binoti Simas, Ana Belén Cano Hila, Carlos Maviael de Carvalho

    Published 2021-03-01
    “… O novo coronavírus tem causado impactos negativos em todo mundo, sendo que cada região merece um olhar mais atento para suas particularidades. Assim, a proposta deste trabalho é analisar a evolução do Covid-19, parte das infraestruturas hospitalares e a hierarquia urbana nos municípios do Araguaia Paraense, localizada no Sudeste do Pará, Brasil. …”
    Get full text
    Article
  3. 77783

    En quoi la téquila est-elle un patrimoine ? by Martín Tena Meza, Ricardo Ávila Palafox, Claudio Jiménez Vizcarra

    Published 2013-01-01
    “…It describes the paradoxes of its production and patrimonialization, ambiguities in the law that protects its production and international monopolization, the depletion and margination of small producers of agave, the loss of biological diversity, as well as of the traditional knowledge that exists on the agave and distilled beverages. Finally, it attempts to sketch an alternative to overcome this situation.…”
    Get full text
    Article
  4. 77784

    Zróżnicowanie opóźnień płatniczych w przedsiębiorstwach sektora B2B krajów Europy Wschodniej by Zbigniew Gołaś

    Published 2016-05-01
    “…Analizę oparto na danych pochodzących z raportów międzynarodowej wywiadowni gospodarczej Atriadus dotyczących przedsiębiorstw w Polsce, Słowacji, Czechach, na Węgrzech oraz w Turcji. …”
    Get full text
    Article
  5. 77785

    Acute Kidney Injury in Diabetes Mellitus by D. Patschan, G. A. Müller

    Published 2016-01-01
    “…The kidneys are severely affected as well, partly as a result of intrarenal athero- and arteriosclerosis but also due to noninflammatory glomerular damage (diabetic nephropathy). …”
    Get full text
    Article
  6. 77786

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  7. 77787

    Le tourisme dans les paysages culturels des hauts plateaux du sud de la Chine by Zhe Wang, Nelson Graburn

    Published 2020-10-01
    “…Une approche des parties prenantes est appliquée pour comprendre les attitudes et les pratiques des différents agents envers les champs en terrasses et les villages traditionnels. …”
    Get full text
    Article
  8. 77788

    La collection de dessins français d’Isidoro Brun (1819-1898) au Museo Nacional del Prado by Oriane Lavit

    Published 2017-11-01
    “…This research on the French drawings in the Prado has also provided the possibility for new attributions. This article presents a selection of some of these new contributions.…”
    Get full text
    Article
  9. 77789

    On ƞǤ_Ş-Compactness by Ahmed Sh. Mohamed, R.B. Esmaeel

    Published 2025-01-01
    “… Open sets may be viewed as an extension of semi-open sets by applying the notions of semi-open sets and grill nano to nGs-open sets, with the following four goals in mind: The objective is to characterize nGs-open sets by examining and proving numerous of its attributes and comments. And investigate and define new kinds of functions based on the concept of nGs-open sets, using sets of nGs-open sets, we will define a new  type of Compact type and call it nGs-open compact then we will find the relationship between these new types of Compact type with nano compact. …”
    Get full text
    Article
  10. 77790

    FEAR PHENOMENON IN EXISTENTIAL PHILOSOPHY by V. V. Melnyk

    Published 2017-06-01
    “…The author emphasizes that the fear is objectified in the culture and is amenable to the mechanism of minimization. Great attention is paid to the provocation of the depression by fear. …”
    Get full text
    Article
  11. 77791
  12. 77792

    Effectiveness of the Palestinian Civil Police’s Accountability and Complaint System by Mustafa Abdelbaqi

    Published 2025-01-01
    “…Conclusions: The study concludes that the Palestinian police should simplify the structure of the accountability and complaints system, ensure public access to accountability units, and pay particular attention to complaints filed by marginalized and vulnerable individuals, especially women, children and the physically challenged. …”
    Get full text
    Article
  13. 77793

    Multifocal motor neuropathy. A clinical case and literature review by O. Laucius, V. Danielius, T. Vanagas, P. Valiukevičius

    Published 2023-10-01
    “…After laboratory tests, long-term supervision, and exclusion of other diagnoses, the patient was diagnosed with an atypical type of multifocal motor neuropathy responsive to treatment with intravenous immunoglobulin. …”
    Get full text
    Article
  14. 77794

    (Study on Stomach Contents of Opudi Fish (Telmatherina celebensis) in Towuti Lake, South Sulawesi) by . Sulistiono, A. Furkon, R. Affandi

    Published 2007-07-01
    “…Ikan yang tertangkap (N=273) terdiri atas Jantan (141) dan betina (132), yang memiliki variasi ukuran panjang tubuh (55,8-94,7 mm). …”
    Get full text
    Article
  15. 77795

    Superfoods: exploring sustainability perspectives between nutrient synthesizers and accumulators by G. Santunione, G. Montevecchi, G. Montevecchi

    Published 2025-02-01
    “…Nevertheless, great attention must be paid to vegetable crops that imply an overexploitation of soil and water and induce the degradation of entire ecosystems.…”
    Get full text
    Article
  16. 77796

    Fatigue crack growth under remote and local compression – a state-of-the-art review by A. Chahardehi, A. Mehmanparast

    Published 2016-01-01
    “…With the move towards more complex, probabilistic assessments, the traditional ‘safe’ or conservative approach for prediction of fatigue crack growth rate may no longer be attractive. Current codes and standards tend to be ambiguous about the treatment of compressive stress cycles: on the one hand code guidance on fatigue crack initiation may be non-conservative, while assessment of crack propagation may be inconsistently conservative. …”
    Get full text
    Article
  17. 77797
  18. 77798

    Public acceptance in direct potable water reuse: a call for incorporating responsible research and innovation by Karen Moesker, Udo Pesch, Neelke Doorn

    Published 2024-12-01
    “…We advocate for becoming more inclusive through the `leaving ajar' approach. Particularly, attention should be paid to reflexivity and responsiveness to public concerns to ensure meaningful public engagement.…”
    Get full text
    Article
  19. 77799

    High-energy Neutrino Source Cross-correlations with Nearest-neighbor Distributions by Zhuoyang Zhou, Jessi Cisewski-Kehe, Ke Fang, Arka Banerjee

    Published 2025-01-01
    “…Effectively characterizing the spatial distribution of the neutrino samples and associating the events with astrophysical source catalogs can be challenging given the large atmospheric neutrino background and underlying non-Gaussian spatial features in the neutrino and source samples. …”
    Get full text
    Article
  20. 77800

    Impact Angle Control Guidance to Intercept Moving Targets by Virtual Target Technique by Libing Hou, Jihong Zhu, Minchi Kuang, Heng Shi

    Published 2021-01-01
    “…The proposed guidance law makes the lateral acceleration of the missile converge to zero, which leads the angle of attack to zero, and it theoretically guarantees the flight path angle equals the attitude angle. …”
    Get full text
    Article