Showing 541 - 560 results of 712 for search 'Manowar~', query time: 2.30s Refine Results
  1. 541

    The Process of Nanostructuring of Metal (Iron) Matrix in Composite Materials for Directional Control of the Mechanical Properties by Elena Zemtsova, Denis Yurchuk, Vladimir Smirnov

    Published 2014-01-01
    “…We justified theoretical and experimental bases of synthesis of new class of highly nanostructured composite nanomaterials based on metal matrix with titanium carbide nanowires as dispersed phase. A new combined method for obtaining of metal iron-based composite materials comprising the powder metallurgy processes and the surface design of the dispersed phase is considered. …”
    Get full text
    Article
  2. 542

    Electrosynthesis of NH3 from NO with ampere-level current density in a pressurized electrolyzer by Wenqiang Yang, Huan Liu, Xiaoxia Chang, Yunlong Zhang, Yafeng Cai, Yifan Li, Yi Cui, Bingjun Xu, Liang Yu, Xiaoju Cui, Dehui Deng

    Published 2025-02-01
    “…Integrating the Cu nanowire array monolithic electrode with pressurized electrolyzer boosts the NH3 production rate to 10.5 mmol h–1 cm–2, which is over tenfold that using commercial Cu foam at 1 atm. …”
    Get full text
    Article
  3. 543

    Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering by Khafidzun Fadli, Achmad Basuki, Eko Setiawan

    Published 2020-05-01
    “…Penyebab LAN menjadi tidak aman dikarenakan teknologi firewall tidak mampu melindungi host (komputer) dalam LAN dari penyebaran malware. Penyebaran malware yang terdapat dalam LAN dilakukan oleh host di dalam LAN yang disebut sebagai malicious host. …”
    Get full text
    Article
  4. 544

    Feasibility Analysis of Illustrated Concept Map-Based Handouts on Plant and Animal Organ System Material by Erna Diana, Mulyadi

    Published 2024-12-01
    “…Teaching materials at MAS Al-Manar are limited to printed books, which hinders students' access to a variety of learning sources, particularly in abstract Biology topics. …”
    Get full text
    Article
  5. 545

    Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring by Alde Alanda, H.A Mooduto, Ronal Hadi

    Published 2023-09-01
    “…Wazuh's capabilities such as log data collection, malware detection, active response automation, and Docker container monitoring, are examined. …”
    Get full text
    Article
  6. 546

    Recent development in electrolytic formation of carbon nanotubes in molten salts by Chen G.Z., Fray D.J.

    Published 2003-01-01
    “…It is anticipated that the electrolytic method can potentially become a cheap and continuous process for the production of curved carbon nano-tubes, carbon sheathed metal nanowires and other carbon based nano-structures.…”
    Get full text
    Article
  7. 547

    Pengukuran Kesadaran Keamanan Informasi Pegawai: Studi Kasus PT Meshindo Jayatama by Abdul Gofur, Rizal Fathoni Aji, Heri Kurniawan

    Published 2024-08-01
    “…Hasil wawancara dengan Presiden Direktur dan Manager Teknologi Informasi (TI) PT Meshindo Jayatama menyatakan bahwa telah terjadi serangan seperti Phishing dan Malware sebanyak 26 kali ditahun 2023. Dengan adanya serangan malware yang mengakibatkan terinfeksinya dokumen laporan perusahaan dan kerugian finansial yang disebabkan oleh faktor kelalaian sumber daya manusia, menjadi pertimbangan perlu untuk dilakukan pengukuran kesadaran keamanan informasi dan mengetahui area yang perlu ditingkatkan. …”
    Get full text
    Article
  8. 548
  9. 549

    EXPERIENCIAS DE ALGUNOS PAÍSES LATINOAMERICANOS EN TORNO A LA ESTANDARIZACIÓN CONTABLE INTERNACIONAL by Abel María Cano Morales

    Published 2010-01-01
    “…Este trabajo presenta de manera tangencial los pasos que han seguido algunos países, con el fin de estandarizar sus procesos e información contable, de manera tal que los sectores empresariales de un país puedan interactuar con éxito en el nuevo mundo de los negocios, cabe anotar que para que ello suceda las empresas deben replantear sus sistemas de información administrativa y contable. …”
    Get full text
    Article
  10. 550

    APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System by Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, Waseem Akram, Khalid Mahmood, Ashok Kumar Das, Sachin Shetty

    Published 2023-01-01
    “…Machine learning (ML) techniques have shown potential in identifying APT attacks in autonomous and malware detection systems. However, detecting hidden APT attacks in the I-IoT-enabled CPS domain and achieving real-time accuracy in detection present significant challenges for these techniques. …”
    Get full text
    Article
  11. 551
  12. 552

    Nilai Moral sebagai Prediktor Orientasi Politik pada Anggota Organisasi Keagamaan by Irfan Fahmi, Bagus Takwin, Roby Muhamad

    Published 2019-12-01
    “…Participants in this study were 531 Muslims who affiliated the Nahdlatul Ulama (NU), Muhammadiyah, Persis, Mathlaul Anwar, PUI, LDII, and Hizb ut-Tahrir Indonesia (HTI). …”
    Get full text
    Article
  13. 553
  14. 554

    A New Sensors-Based Covert Channel on Android by Ahmed Al-Haiqi, Mahamod Ismail, Rosdiadee Nordin

    Published 2014-01-01
    “…Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. …”
    Get full text
    Article
  15. 555

    Optimizing Brand Loyalty: The Effectiveness of Influencer Marketing and Digital Content Campaigns Mediated By Consumer Trust by Muhammad Aldi, Whisnu Adisaputra

    Published 2024-06-01
    “…This study explores how influencer marketing and digital content campaigns affect brand loyalty, with consumer trust acting as a mediator, within Polewali Mandar Regency. Using a quantitative approach and Structural Equation Modeling (SEM), data were gathered from 100 local consumers who interacted with these marketing tactics. …”
    Get full text
    Article
  16. 556

    Approaches to cyber weapons classification problem by V. V. Kabernik

    Published 2013-04-01
    “…Working criteria for differentiation between information warfare and practical cyber warfare is suggested for proper classification of malware, espionage toolkits, hacking tools and combat software.…”
    Get full text
    Article
  17. 557

    Ictiofauna de la Ensenada de la Siguanea (Cuba) by Tsai García-Galano, Zenaida María Navarro Martínez, Leandro Rodríguez-Viera, Jorge Angulo-Valdés

    Published 2024-11-01
    “… Los manglares, pastizales marinos y arrecifes de coral están estrechamente relacionados, y entre ellos existe un alto grado de conectividad. …”
    Get full text
    Article
  18. 558

    Ženy v pozadí, či jako aktivní hospodářky? Podíl šlechtičen na hospodaření a správě raně novověkého velkostatku by Marie Ryantová

    Published 2023-07-01
    “… The contribution looks at the share of women in the economic activities and management of the manor of the early modern nobility, which became increasingly important with the increase in the activities and workload of their husbands. …”
    Get full text
    Article
  19. 559

    A photodetector for red and green with balanced negative and positive photocurrent for imaging is realized by Xuan Pu, Rongli Deng, Guanzhao Yang, Wenfeng Zhang, Haibin Lin, Junyong Li, Richard Nötzel

    Published 2025-01-01
    “…It is based on a core-shell n-InGaN nanowire/p-Cu2O heterostructure with inner upward energy band bending and near surface downward energy band bending. …”
    Get full text
    Article
  20. 560

    Coupled acoustoplasmonic resonators: the role of geometrical symmetries by Castillo López de Larrinzar Beatriz, García Jorge M., Xiang Chushuang, Lanzillotti-Kimura Norberto D., García-Martín Antonio

    Published 2025-01-01
    “…Acoustoplasmonic resonators, such as nanobars and crosses, are efficient acousto-optical transducers. …”
    Get full text
    Article