-
821
Embalses Costeros Para el Control de los Mosquitos
Published 2012-07-01“…Los embalses costeros utilizados en Florida para el control de los mosquitos son marismas o manglares con un dique periférico que permite inundar el área durante la temporada de cría de mosquitos. …”
Get full text
Article -
822
Embalses Costeros Para el Control de los Mosquitos
Published 2012-07-01“…Los embalses costeros utilizados en Florida para el control de los mosquitos son marismas o manglares con un dique periférico que permite inundar el área durante la temporada de cría de mosquitos. …”
Get full text
Article -
823
Tin-Doped Indium Oxide-Titania Core-Shell Nanostructures for Dye-Sensitized Solar Cells
Published 2014-01-01“…High-density, vertically aligned ITO nanowires are grown via a thermal evaporation method and TiO2 is coated on nanowire surfaces via TiCl4 treatment. …”
Get full text
Article -
824
Characterization of the natural mineral form from the PbS-Sb2S3 system
Published 2010-01-01“…Investigated sulfosalt appears in nature in the form of nanowires with diameters ranging from 200 to 500 nm and its length can reach up to 150 mm. …”
Get full text
Article -
825
Growth of GaN@InGaN Core-Shell and Au-GaN Hybrid Nanostructures for Energy Applications
Published 2009-01-01“…We demonstrated a method to control the bandgap energy of GaN nanowires by forming GaN@InGaN core-shell hybrid structures using metal organic chemical vapor deposition (MOCVD). …”
Get full text
Article -
826
Optical Properties of One-Dimensional Structured GaN:Mn Fabricated by a Chemical Vapor Deposition Method
Published 2013-01-01“…The morphology and crystallinity of the GaN nanowires were characterized by field-emission scanning electron microscopy and X-ray diffraction. …”
Get full text
Article -
827
SCANNING PROBE TECHNIQUES IN MICRO- AND NANOMECHANICS
Published 2015-04-01“…The methods are realized on the base of AFM with surface mapping contrast, static and dynamics force spectroscopy and with the procedures of nanowear and oscillating microtribometry.…”
Get full text
Article -
828
RETRACTED ARTICLE: Causes of death in patients with a history of severe anorexia nervosa
Published 2022-12-01Get full text
Article -
829
One-Dimensional SnO2 Nanostructures: Synthesis and Applications
Published 2012-01-01“…Nanoscale semiconducting materials such as quantum dots (0-dimensional) and one-dimensional (1D) structures, like nanowires, nanobelts, and nanotubes, have gained tremendous attention within the past decade. …”
Get full text
Article -
830
Density Functional Study of Electronic and Structural Properties of Gold-Cadmium Selenide/Telluride Nanoclusters
Published 2015-01-01“…Semiconductor nanowires are one class of building blocks that show promise for application in nanoscale electronics. …”
Get full text
Article -
831
-
832
Expressed motives of amateur karate and taekwondo athletes for sport participation
Published 2017-12-01“…In the evaluation of data in addition to descriptive statistical methods, MANOVA was used to identify significant differences. …”
Get full text
Article -
833
The Process of Nanostructuring of Metal (Iron) Matrix in Composite Materials for Directional Control of the Mechanical Properties
Published 2014-01-01“…We justified theoretical and experimental bases of synthesis of new class of highly nanostructured composite nanomaterials based on metal matrix with titanium carbide nanowires as dispersed phase. A new combined method for obtaining of metal iron-based composite materials comprising the powder metallurgy processes and the surface design of the dispersed phase is considered. …”
Get full text
Article -
834
Electrosynthesis of NH3 from NO with ampere-level current density in a pressurized electrolyzer
Published 2025-02-01“…Integrating the Cu nanowire array monolithic electrode with pressurized electrolyzer boosts the NH3 production rate to 10.5 mmol h–1 cm–2, which is over tenfold that using commercial Cu foam at 1 atm. …”
Get full text
Article -
835
Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering
Published 2020-05-01“…Penyebab LAN menjadi tidak aman dikarenakan teknologi firewall tidak mampu melindungi host (komputer) dalam LAN dari penyebaran malware. Penyebaran malware yang terdapat dalam LAN dilakukan oleh host di dalam LAN yang disebut sebagai malicious host. …”
Get full text
Article -
836
Feasibility Analysis of Illustrated Concept Map-Based Handouts on Plant and Animal Organ System Material
Published 2024-12-01“…Teaching materials at MAS Al-Manar are limited to printed books, which hinders students' access to a variety of learning sources, particularly in abstract Biology topics. …”
Get full text
Article -
837
Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring
Published 2023-09-01“…Wazuh's capabilities such as log data collection, malware detection, active response automation, and Docker container monitoring, are examined. …”
Get full text
Article -
838
Recent development in electrolytic formation of carbon nanotubes in molten salts
Published 2003-01-01“…It is anticipated that the electrolytic method can potentially become a cheap and continuous process for the production of curved carbon nano-tubes, carbon sheathed metal nanowires and other carbon based nano-structures.…”
Get full text
Article -
839
Pengukuran Kesadaran Keamanan Informasi Pegawai: Studi Kasus PT Meshindo Jayatama
Published 2024-08-01“…Hasil wawancara dengan Presiden Direktur dan Manager Teknologi Informasi (TI) PT Meshindo Jayatama menyatakan bahwa telah terjadi serangan seperti Phishing dan Malware sebanyak 26 kali ditahun 2023. Dengan adanya serangan malware yang mengakibatkan terinfeksinya dokumen laporan perusahaan dan kerugian finansial yang disebabkan oleh faktor kelalaian sumber daya manusia, menjadi pertimbangan perlu untuk dilakukan pengukuran kesadaran keamanan informasi dan mengetahui area yang perlu ditingkatkan. …”
Get full text
Article -
840
Behaviour Analysis of Mobile Malicious Software in Network
Published 2015-08-01“…A behavior analysis method of mobile malicious softwares and a corresponding solution on the network-side were proposed.The method combined network behaviors and virus-inner behaviors of a mobile malicious software to improve the accuracy and the timeliness.The method was a useful guidance for communication operators to block mobile malware in real time.…”
Get full text
Article