Showing 361 - 380 results of 645 for search 'ATTAC*', query time: 0.06s Refine Results
  1. 361

    Orkut e Facebook: as teias da memória em meio às redes sociais by Marcia Elisa Rendeiro

    Published 2011-01-01
    “…We remind that, concerning the group of experiences in which the action of collecting generates, the satisfaction granted by the possession of objects and the value attached to them (either as an element of trade or just as something to be seen and admired) deserve to be on the spot. …”
    Get full text
    Article
  2. 362

    Sustained slow-release TGF-β3 in a three-dimensional-printed titanium microporous scaffold composite system promotes ligament-to-bone healing by Liwei Zhu, Yuzhe Liu, Yifu Sun, Zhenjia Che, Youbin Li, Tengyue Liu, Xudong Li, Chengzhe Yang, Lanfeng Huang

    Published 2025-04-01
    “…Hard tissue sections showed that the new bone, ligament, and the titanium alloy scaffold system formed a closely integrated whole; the composite system provided suitable attachment points for ligament growth. Additionally, the biomechanical strength of the tendon interface improved to some extent. …”
    Get full text
    Article
  3. 363
  4. 364

    Monogenean Parasites of Fish by Peggy Reed, Ruth Francis-Floyd, RuthEllen Klinger, Denise Petty

    Published 2012-08-01
    “…Most monogeneans are browsers that move about freely on the fish’s body surface feeding on mucus and epithelial cells of the skin and gills; however, a few adult monogeneans will remain permanently attached to a single site on the host. Some monogenean species invade the rectal cavity, ureter, body cavity, and even the blood vascular system. …”
    Get full text
    Article
  5. 365

    Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption by Rebwar Khalid Muhammed, Ribwar Rashid Aziz, Alla Ahmad Hassan, Aso Mohammed Aladdin, Shaida Jumaah Saydah, Tarik Ahmed Rashid, Bryar Ahmad Hassan

    Published 2024-05-01
    “…The recognition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. …”
    Get full text
    Article
  6. 366

    Eastern Cherry Fruit Fly, Rhagoletis cingulata (Loew) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Jr.

    Published 2004-07-01
    “… Larvae of two closely related species of fruit flies in central and eastern North America -- Rhagoletis cingulata (Loew), commonly called the cherry fruit fly or cherry maggot, and Rhagoletis fausta (Osten Sacken), the black cherry fruit fly -- attack cherry and cause wormy fruits. Only R. cingulata occurs in Florida, where it attacks wild cherries and is of little economic importance. …”
    Get full text
    Article
  7. 367

    A deep learning-driven multi-layered steganographic approach for enhanced data security by Yousef Sanjalawe, Salam Al-E’mari, Salam Fraihat, Mosleh Abualhaj, Emran Alzubi

    Published 2025-02-01
    “…This paper addresses key limitations of traditional steganographic methods, such as limited payload capacity, susceptibility to detection, and lack of robustness against attacks. A novel multi-layered steganographic framework is proposed, integrating Huffman coding, Least Significant Bit (LSB) embedding, and a deep learning-based encoder–decoder to enhance imperceptibility, robustness, and security. …”
    Get full text
    Article
  8. 368

    Potency of the Consortium of Pseudomonad fluorescent pf-142 and Bacillus mycoides Isolates Against Bacterial Wilt Disease In-Vitro by Yosua Nathanael Itona Sagala, Endang Triwahyu Prasetyawati, Yenny Wuryandari

    Published 2024-12-01
    “…The variables observed were the symptoms of attack and pathogenicity of R. solanacearum, compatibility and inhibitory rate of the consortium of Pseudomonad fluorescens pf-142 and B. mycoides against R. solanacearum. …”
    Get full text
    Article
  9. 369

    Metode Deteksi Pokok Pohon Secara Automatis pada Citra Perkebunan Sawit Menggunakan Model Convolutional Neural Network (CNN) pada Perangkat Lunak Sistem Informasi Geografis by Samuel Samuel, Kestrilia Rega Prilianti, Hendry Setiawan, Prasetyo Mimboro

    Published 2022-12-01
    “…However, the monitoring process related to disease attack and nutritional status becomes a challenge if it is done manually. …”
    Get full text
    Article
  10. 370

    Cyberbullying by Kate Fogarty

    Published 2012-08-01
    “…This involves put-downs, publicly sharing personal information, stalking, and other overt attacks upon a person, all using electronic communication.” …”
    Get full text
    Article
  11. 371

    Trade, Violence and Diplomacy on the Coast of Ikorodu: The Resistance of Balogun Mabadeje Jaiyesimi by Adebowale Adeyemi-Suenu

    Published 2021-12-01
    “…It not only addresses the dearth of published work on Ikorodu but also provides a response to Earl Phillips’ discussion of the unsuccessful 1864–5 Egba attack on Ikorodu. Unlike Philips, who suggests that the Egba defeat was primarily engineered by John Glover, this article emphasises the importance of Balogun Jaiyesimi’s strategic and negotiating skills, which led to the formation of a local coalition between Ikorodu and its neighbouring towns, especially Igbogbo, to ensure Ikorodu’s military victory. …”
    Get full text
    Article
  12. 372

    Detection to false data for smart grid by Jian Zheng, Shumiao Ren, Jingyue Zhang, Yu Kui, Jingyi Li, Qin Jiang, Shiyan Wang

    Published 2025-02-01
    “…Abstract False data injection attack in smart grid might does not launch interference and attack behaviors, so that this attack is difficult found. …”
    Get full text
    Article
  13. 373

    Citrus Diseases Exotic to Florida: Huanglongbing (Citrus Greening) by Kuang-Ren Chung, R. H. Briansky

    Published 2005-07-01
    “…Economic losses due to plant diseases can be severe, but fortunately, not all pathogens attacking citrus are present in Florida. There are other serious, exotic pathogens that have not been introduced into Florida. …”
    Get full text
    Article
  14. 374

    Pine Sawflies, Neodiprion spp. (Insecta: Hymenoptera: Diprionidae) by Wayne N. Dixon

    Published 2005-04-01
    “…Sawfly infestations can cause growth loss and mortality, especially when followed by secondary attack by bark and wood-boring beetles (Coleoptera: Buprestidae, Cerambycidae, Scolytidae,). …”
    Get full text
    Article
  15. 375

    Effect of Nb0.5 and Mo0.75 addition on in-vitro corrosion and wear resistance of high-speed laser metal deposited Al0.3CrFeCoNi high-entropy alloy coatings by Burak Dikici, Thomas Lindner, Thomas Lampke, Thomas Grund, Asli Gunay Bulutsuz

    Published 2025-03-01
    “…This was due to the slower progression of deeper corrosion attacks in unmelted particles, which minimized the micro-galvanic effects associated with the eutectic structures within these particles. …”
    Get full text
    Article
  16. 376

    An immunoregulation PLGA/Chitosan aligned nanofibers with polydopamine coupling basic fibroblast growth factor and ROS scavenging for peripheral nerve regeneration by Xiaokun Chen, Jihai Xu, Feng Qin, Ziyuan Yang, Xueyuan Li, Miao Yu, Ming Li, Yanhua Wang, Wang Xin

    Published 2025-04-01
    “…The bFGF growth factor attached to the PDA coating facilitated sustained release, enhancing Schwann cell functionality and stimulating neurite outgrowth. …”
    Get full text
    Article
  17. 377

    Cactus Bug, Chelinidea vittiger aequoris McAtee (Insecta: Hemiptera: Coreidae) by Frank W. Mead, J. R. Herring

    Published 2004-07-01
    “… Insects that attack prickly pear cacti, Opuntia spp., in North America have been under investigation for a century. …”
    Get full text
    Article
  18. 378

    Nematodes and Their Management by J. W. Noling

    Published 2012-01-01
    “… Plant parasitic nematodes are microscopic roundworms which live in the soil and attack the roots of plants. Crop production problems induced by nemotodes therefore generally occur as a result of root dysfuntion, reducing rooting volume and foraging and utilization efficiency of water and nurtients. …”
    Get full text
    Article
  19. 379

    Robber Flies, Asilidae (Insecta: Diptera: Asilidae) by E. M. Finn

    Published 2004-12-01
    “…As their common name implies, robber flies have voracious appetites and feed on a vast array of other arthropods, which may help to maintain a healthy balance between insect populations in various habitats (Joern and Rudd 1982, Shurovnekov 1962). Asilidae adults attack wasps, bees, dragonflies, grasshoppers, other flies, and some spiders. …”
    Get full text
    Article
  20. 380

    Yellow Garden Spider, Writing Spider Argiope aurantia (Lucas) (Arachnida: Araneae: Araneidae) by Taryn B. Griffith, Jennifer Lynn Gillett-Kaufman

    Published 2020-05-01
    “…Although their appearance may cause alarm, the species is relatively harmless and will generally leave its web to flee rather than attack when disturbed (Enders 1973). https://edis.ifas.ufl.edu/in1273 …”
    Get full text
    Article