Showing 13,241 - 13,260 results of 14,440 for search 'BCIT~', query time: 1.44s Refine Results
  1. 13241

    Pheromone Production, Attraction, and Interspecific Inhibition among Four Species of Ips Bark Beetles in the Southeastern USA by Göran Birgersson, Mark J. Dalusky, Karl E. Espelie, C. Wayne Berisford

    Published 2012-01-01
    “…The subtractive assays showed that I. grandicollis and I. calligraphus share (–)-(4S)-cis-verbenol as one pheromone component, while their second, synergistic pheromone component, (–)-(S)-ipsenol in I. grandicollis and (±)-ipsdienol in I. calligraphus, acts as an interspecific inhibitor to the other species. …”
    Get full text
    Article
  2. 13242

    Multi-tissue characterization of the constitutive heterochromatin proteome in Drosophila identifies a link between satellite DNA organization and transposon repression. by Ankita Chavan, Lena Skrutl, Federico Uliana, Melanie Pfister, Franziska Brändle, Laszlo Tirian, Delora Baptista, Dominik Handler, David Burke, Anna Sintsova, Pedro Beltrao, Julius Brennecke, Madhav Jagannathan

    Published 2025-01-01
    “…Here, we use 2 satellite DNA-binding proteins, D1 and Prod, as baits to characterize the chromocenter-associated proteome in Drosophila embryos, ovaries, and testes through quantitative mass spectrometry. …”
    Get full text
    Article
  3. 13243

    Clinical, cytologic, bacteriologic and radiographic analysis of respiratory diseases in dogs by Mehmet Maden, Fatih M. Birdane, Fahrettin Atkan, Hasan H, Hadimli

    “…While there was a statistically significant increase (p<0,0011 in the neutrophil counts, there was a statistically significant decrease (p<0.001) on macrophage and lenfocyte counts in both groups Statistically sıgnilıcani increase (p<0.05) on epithel cells counts was found Coc and/or bacits were seen in all cases Three dogs had fungal organisms, and one had anaerob bacteria Uordetella bronchiseptica and E coli (% 24) were the most isolated bacteria species in BAL fluid culture. …”
    Get full text
    Article
  4. 13244

    Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case by Xiaohui ZHANG, Shunliang ZHANG, Bowen LI

    Published 2020-10-01
    “…A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also employed in the proposed scheme.The proposed scheme was featured as lower complexity and higher secrecy transmission rate.Corresponding mathematical analysis had been performed in terms of the error probability,security and transmission rate.The result reveals that the proposed scheme can achieve reliability,security in negative secrecy capacity case.What’s more,it has relatively low complexity and high secrecy transmission rate compared with the existing schemes.…”
    Get full text
    Article
  5. 13245

    Diversité et importance de la flore ligneuse de la ville de Sokodé (Centre - Togo) by Samsahatou Tourey, Tchaa Boukpessi, Koffi Djagnikpo Kpedenou, Tanzidani Komlan Thiou Tchamie

    Published 2021-02-01
    “…The Shannon diversity index (4.8 bits) is relatively higher at the establishment level, followed by concessions (4.61 bits), interstices (4.03 bits) then roads (3.7 bits). …”
    Get full text
    Article
  6. 13246

    Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images by R. Youmaran, A. Adler

    Published 2012-01-01
    “…From this, the biometric feature information is calculated to be approximately 278 bits for PCA and 288 bits for ICA iris features using Masek's iris recognition scheme. …”
    Get full text
    Article
  7. 13247

    Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems by Junling Pei, Lusheng Chen

    Published 2023-05-01
    “…The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3‐round Keccak‐256 and Keccak‐512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 265 and 2440 to 264.79 and 2424, respectively. …”
    Get full text
    Article
  8. 13248

    Metacognition in wild Japanese macaques: cost and stakes influencing information-seeking behavior by Lorraine Subias, Noriko Katsu, Kazunori Yamada

    Published 2024-03-01
    “…We varied three parameters: the baiting process, the cost that monkeys had to pay to look inside the tubes, and the reward at stake. …”
    Get full text
    Article
  9. 13249

    Effects of Purple and Green-Colored Bottle Traps on Captures of Ambrosia Beetles in Ornamental Nurseries by Ramkumar Govindaraju, Shimat V. Joseph

    Published 2025-01-01
    “…In 2023 and 2024, experiments were conducted using bottle traps baited with AgBio low-release ethanol lure (LR ethanol lure). …”
    Get full text
    Article
  10. 13250

    Advanced methodologies and technologies in government and society /

    Published 2019
    Table of Contents: “…Steinfeld -- Public policies for providing cloud computing services to SMEs of Latin America / Mohd Nayyer Rahman, Badar Alam Iqbal -- Community science and technology and its meaning to potential requirement / P.K. Paul, A. …”
    View in OPAC
    Book
  11. 13251

    Advanced methodologies and technologies in government and society /

    Published 2019
    Table of Contents: “…Steinfeld -- Public policies for providing cloud computing services to SMEs of Latin America / Mohd Nayyer Rahman, Badar Alam Iqbal -- Community science and technology and its meaning to potential requirement / P.K. Paul, A. …”
    View in OPAC
    Book
  12. 13252

    A Post-Processing Method for Quantum Random Number Generator Based on Zero-Phase Component Analysis Whitening by Longju Liu, Jie Yang, Mei Wu, Jinlu Liu, Wei Huang, Yang Li, Bingjie Xu

    Published 2025-01-01
    “…Furthermore, the randomness extraction is performed after ZCA whitening, after which the final random bits can pass the NIST test.…”
    Get full text
    Article
  13. 13253

    A Simple Binary Run-Length Compression Technique for Non-Binary Sources Based on Source Mapping by Abdel-Rahman Jaradat, Mansour I. Irshid

    Published 2001-01-01
    “…When applying this simple encoding technique to English text files, we achieve a compression of 5.44bits/character and 4.6bits/character for the fixed-length code and the variablelength (Huffman) code, respectively.…”
    Get full text
    Article
  14. 13254

    Investigation of non-alcoholic steatohepatitis in labidochromis caeruleus and xiphophorus hellerii by Mustafa Ünal Boyraz, Muhammet Yaşar Dörtbudak, Muhammet Bahıttin Dörtbudak

    “…<p> <b>Conclusion:</b> The histopathological changes in the liver were investigated and under optimum conditions and standard feding conditions, and the sensitivities of these commercially important aquarium ornamental fishes were determined against market baits. It has been concluded that the sespecies can be a model organism for studies on fatty liver thanks to widespread/clear visualization of fatty liver and observation of a case of steatohepatitis, which is an important health problem and has not been previously reported for Labidochromis caeruleus and Xiphophorus hellerii species.…”
    Get full text
    Article
  15. 13255

    Persistence of the entomopathogenic nematode Steinernema feltiae in a novel capsule formulation by Jermaine D. Perier, Shaohui Wu, Steven P. Arthurs, Michael D. Toews, David I. Shapiro-Ilan

    Published 2025-01-01
    “…The new formulation was compared to the traditional aqueous application, using the baiting method with Tenebrio molitor larvae. In laboratory experiments, the capsule formulation of S. feltiae ENO2 strain was compared with aqueous applications of ENO2 and SN strain at 23 °C for 0, 7, 14, 21, and 28 days after treatment (DAT) in soil cups. …”
    Get full text
    Article
  16. 13256

    Addressing Missing Data in Slope Displacement Monitoring: Comparative Analysis of Advanced Imputation Methods by Seungjoo Lee, Yongjin Kim, Bongjun Ji, Yongseong Kim

    Published 2025-01-01
    “…This study addresses these challenges by evaluating advanced machine learning models—SAITS, ImputeFormer, and BRITS (Bidirectional Recurrent Imputation for Time Series)—for missing data imputation in slope displacement datasets. …”
    Get full text
    Article
  17. 13257

    Impact of the Invasive Brown Marmorated Stink Bug, Halyomorpha halys (Stål), in Mid-Atlantic Tree Fruit Orchards in the United States: Case Studies of Commercial Management by Tracy C. Leskey, Brent D. Short, Bryan R. Butler, Starker E. Wright

    Published 2012-01-01
    “…Four commercial orchards in the mid-Atlantic region of the United States were surveyed weekly in 2010 and 2011 for the presence of brown marmorated stink bug and the injury caused to both apple and peaches. …”
    Get full text
    Article
  18. 13258

    Insects of the Subfamily Scolytinae (Insecta: Coleoptera, Curculionidae) Collected with Pitfall and Ethanol Traps in Primary Forests of Central Amazonia by Raimunda Liege Souza de Abreu, Greicilany de Araújo Ribeiro, Bazilio Frasco Vianez, Ceci Sales-Campos

    Published 2012-01-01
    “…Five impact traps of the type Escolitideo/Curitiba, with ethanol baits, were installed at the height of 3 m above the ground, and five pitfall traps were buried in the same area of the above ground traps. …”
    Get full text
    Article
  19. 13259

    The first rodent behavioral study (1822) and the diffusion of human-bred albino rats and mice in the 19th century by Raffaele d’Isa

    Published 2025-02-01
    “…Moreover, at that time, in the Western world rats were mostly seen as pest animals or baits for rat-catching sports, and were not kept as pets. …”
    Get full text
    Article
  20. 13260

    Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application by Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin

    Published 2023-01-01
    “…This cryptographic scheme&#x2019;s full description of encryption and decryption is measured and rigorously assessed to support its multimedia applications. The observed speed of this technique, which uses a key of 256 bits and a block size of 128 bits, is comparable to three-key triple-DES.…”
    Get full text
    Article