Suggested Topics within your search.
Suggested Topics within your search.
- History 14
- Politics and government 8
- Social conditions 8
- Biochemistry 6
- Law 6
- methods 6
- Electric wiring, Interior 5
- Health 5
- Juvenile literature 5
- Physical fitness 5
- Sociology 5
- Digital techniques 4
- Economic conditions 4
- Economic policy 4
- Management 4
- Nursing 4
- Photography 4
- Race relations 4
- Social policy 4
- Social problems 4
- Cultural pluralism 3
- Discrimination 3
- Domestic relations 3
- Education 3
- Electric wiring 3
- Ethnic relations 3
- Ethnology 3
- Gays 3
- Health and Fitness 3
- History and criticism 3
-
13241
Pheromone Production, Attraction, and Interspecific Inhibition among Four Species of Ips Bark Beetles in the Southeastern USA
Published 2012-01-01“…The subtractive assays showed that I. grandicollis and I. calligraphus share (–)-(4S)-cis-verbenol as one pheromone component, while their second, synergistic pheromone component, (–)-(S)-ipsenol in I. grandicollis and (±)-ipsdienol in I. calligraphus, acts as an interspecific inhibitor to the other species. …”
Get full text
Article -
13242
Multi-tissue characterization of the constitutive heterochromatin proteome in Drosophila identifies a link between satellite DNA organization and transposon repression.
Published 2025-01-01“…Here, we use 2 satellite DNA-binding proteins, D1 and Prod, as baits to characterize the chromocenter-associated proteome in Drosophila embryos, ovaries, and testes through quantitative mass spectrometry. …”
Get full text
Article -
13243
Clinical, cytologic, bacteriologic and radiographic analysis of respiratory diseases in dogs
Get full text
Article -
13244
Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case
Published 2020-10-01“…A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also employed in the proposed scheme.The proposed scheme was featured as lower complexity and higher secrecy transmission rate.Corresponding mathematical analysis had been performed in terms of the error probability,security and transmission rate.The result reveals that the proposed scheme can achieve reliability,security in negative secrecy capacity case.What’s more,it has relatively low complexity and high secrecy transmission rate compared with the existing schemes.…”
Get full text
Article -
13245
Diversité et importance de la flore ligneuse de la ville de Sokodé (Centre - Togo)
Published 2021-02-01“…The Shannon diversity index (4.8 bits) is relatively higher at the establishment level, followed by concessions (4.61 bits), interstices (4.03 bits) then roads (3.7 bits). …”
Get full text
Article -
13246
Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images
Published 2012-01-01“…From this, the biometric feature information is calculated to be approximately 278 bits for PCA and 288 bits for ICA iris features using Masek's iris recognition scheme. …”
Get full text
Article -
13247
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01“…The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3‐round Keccak‐256 and Keccak‐512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 265 and 2440 to 264.79 and 2424, respectively. …”
Get full text
Article -
13248
Metacognition in wild Japanese macaques: cost and stakes influencing information-seeking behavior
Published 2024-03-01“…We varied three parameters: the baiting process, the cost that monkeys had to pay to look inside the tubes, and the reward at stake. …”
Get full text
Article -
13249
Effects of Purple and Green-Colored Bottle Traps on Captures of Ambrosia Beetles in Ornamental Nurseries
Published 2025-01-01“…In 2023 and 2024, experiments were conducted using bottle traps baited with AgBio low-release ethanol lure (LR ethanol lure). …”
Get full text
Article -
13250
Advanced methodologies and technologies in government and society /
Published 2019Table of Contents: “…Steinfeld -- Public policies for providing cloud computing services to SMEs of Latin America / Mohd Nayyer Rahman, Badar Alam Iqbal -- Community science and technology and its meaning to potential requirement / P.K. Paul, A. …”
View in OPAC
Book -
13251
Advanced methodologies and technologies in government and society /
Published 2019Table of Contents: “…Steinfeld -- Public policies for providing cloud computing services to SMEs of Latin America / Mohd Nayyer Rahman, Badar Alam Iqbal -- Community science and technology and its meaning to potential requirement / P.K. Paul, A. …”
View in OPAC
Book -
13252
A Post-Processing Method for Quantum Random Number Generator Based on Zero-Phase Component Analysis Whitening
Published 2025-01-01“…Furthermore, the randomness extraction is performed after ZCA whitening, after which the final random bits can pass the NIST test.…”
Get full text
Article -
13253
A Simple Binary Run-Length Compression Technique for Non-Binary Sources Based on Source Mapping
Published 2001-01-01“…When applying this simple encoding technique to English text files, we achieve a compression of 5.44bits/character and 4.6bits/character for the fixed-length code and the variablelength (Huffman) code, respectively.…”
Get full text
Article -
13254
Investigation of non-alcoholic steatohepatitis in labidochromis caeruleus and xiphophorus hellerii
Get full text
Article -
13255
Persistence of the entomopathogenic nematode Steinernema feltiae in a novel capsule formulation
Published 2025-01-01“…The new formulation was compared to the traditional aqueous application, using the baiting method with Tenebrio molitor larvae. In laboratory experiments, the capsule formulation of S. feltiae ENO2 strain was compared with aqueous applications of ENO2 and SN strain at 23 °C for 0, 7, 14, 21, and 28 days after treatment (DAT) in soil cups. …”
Get full text
Article -
13256
Addressing Missing Data in Slope Displacement Monitoring: Comparative Analysis of Advanced Imputation Methods
Published 2025-01-01“…This study addresses these challenges by evaluating advanced machine learning models—SAITS, ImputeFormer, and BRITS (Bidirectional Recurrent Imputation for Time Series)—for missing data imputation in slope displacement datasets. …”
Get full text
Article -
13257
Impact of the Invasive Brown Marmorated Stink Bug, Halyomorpha halys (Stål), in Mid-Atlantic Tree Fruit Orchards in the United States: Case Studies of Commercial Management
Published 2012-01-01“…Four commercial orchards in the mid-Atlantic region of the United States were surveyed weekly in 2010 and 2011 for the presence of brown marmorated stink bug and the injury caused to both apple and peaches. …”
Get full text
Article -
13258
Insects of the Subfamily Scolytinae (Insecta: Coleoptera, Curculionidae) Collected with Pitfall and Ethanol Traps in Primary Forests of Central Amazonia
Published 2012-01-01“…Five impact traps of the type Escolitideo/Curitiba, with ethanol baits, were installed at the height of 3 m above the ground, and five pitfall traps were buried in the same area of the above ground traps. …”
Get full text
Article -
13259
The first rodent behavioral study (1822) and the diffusion of human-bred albino rats and mice in the 19th century
Published 2025-02-01“…Moreover, at that time, in the Western world rats were mostly seen as pest animals or baits for rat-catching sports, and were not kept as pets. …”
Get full text
Article -
13260
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
Published 2023-01-01“…This cryptographic scheme’s full description of encryption and decryption is measured and rigorously assessed to support its multimedia applications. The observed speed of this technique, which uses a key of 256 bits and a block size of 128 bits, is comparable to three-key triple-DES.…”
Get full text
Article