Showing 381 - 400 results of 645 for search 'ATTAC*', query time: 0.08s Refine Results
  1. 381

    Population Distribution of Rats (Rattus argentiventer) and the Damage Intensity on Rice and Other Crops in Pleret, Yogyakarta, Indonesia by RR Rukmowati Brotodjojo, Ikhsan Lazuardi, Antik Suprihanti

    Published 2023-12-01
    “…There was no damage on rice crops around the TBS. Rats also attacked corn and sugarcane which caused heavy damage to these crops. …”
    Get full text
    Article
  2. 382

    EVALUATING THREATS OF ARMED BANDITRY ON HUMAN AND FOOD SECURITY IN SHIRORO LOCAL GOVERNMENT AREA OF NIGER STATE, NIGERIA by DR MUSA EMMANUEL UMARU, DR ALIYU MOHAMMED BELLO, DR CHARLES O. OKWUWA

    Published 2023-12-01
    “…The study revealed a distressing percentage of human casualties, accompanied by a significant rise in hospitalizations and trauma resulting from frequent attacks in the region. These incidents have had severe repercussions on human security. …”
    Get full text
    Article
  3. 383

    Enhancing voice spoofing detection in noisy environments using frequency feature masking augmentation by Soyul Han, Jaejin Seo, Sunmook Choi, Taein Kang, Sanghyeok Chung, Seungeun Lee, Seoyoung Park, Seungsang Oh, Il-Youp Kwak

    Published 2025-03-01
    “…This technological evolution, however, introduces heightened security vulnerabilities such as voice spoofing attacks. To address voice spoofing challenges, various competitions like ASVspoof 2015, 2017, 2019, 2021, and ADD 2022 have emerged. …”
    Get full text
    Article
  4. 384

    Diseases in Florida Vegetable Garden Beans: Bush, Lima, Pole, Wax, Southern Peas, English Peas, and Snow Peas by Ken Pernezny, Aaron Palmateer, Tom Kucharek

    Published 2005-07-01
    “… The pathogenic microorganisms that attack garden vegetables, including Bush beans, Lima beans, Pole beans, Wax beans, Southern peas, English peas, and Chinese or Snow peas can be classified into four major groups: fungi, bacteria, nematodes, and viruses. …”
    Get full text
    Article
  5. 385

    Cherry Fruit Fly, Rhagoletis cingulata (Loew) (Insecta: Diptera: Tephritidae) by Howard V. Weems

    Published 2012-03-01
    “… The cherry fruit fly (adult) or cherry maggot (larva) attacks cherry and causes wormy fruits. In Florida, it attacks wild cherries and is of little economic importance. …”
    Get full text
    Article
  6. 386

    “Restoration of the Past Scenery-Realm”: A Research on the Scenery-Realm Restoration of Jiang’s Fu Garden During Qing Dynasty in the Historical Revolution of the Humble Administrat... by Qian BIAN

    Published 2025-02-01
    “…In terms of realm experience, the research analyzes the generation of typical comprehensive experience and emotional activities in the garden from the perspectives of “Dong You Jian Jing Can” (roaming in motion and meditation in stillness) and “Ya Ji Yu Yuan Ju” (elegant gathering and garden dwelling), pointing out that the former, in short-term composite perceptions, is more likely to form differentiated results due to changes in mood, season, and combinations of dynamic and static appreciation, while the latter, through long-term interactive attachment and more nuanced examinations over time, can make the emotional sustenance of guests in the garden more genuine and varied. 2) In response to the question of what qualified the garden as a restoration of the past scenery-realm, the focus is on the “Yuanxiang Hall” area as a clue to explore the value orientation of the Fu Garden’s restoration. …”
    Get full text
    Article
  7. 387

    Challenges in enabling aging-in-place initiatives in aging and shrinking Japanese cities: a case of the Gifu suburbs by Tomoko Kubo, Nobuhiko Komaki, Kensaku Tanaka

    Published 2020-12-01
    “…Finally, we discussed challenges involved in enabling aging-in-place initiatives whose major goal is to provide residential environments in which older adults can maintain continuous residency in their attached homes and neighborhoods in Japanese cities. …”
    Get full text
    Article
  8. 388

    Common Sharks of Florida by Florida Sea Grant

    Published 2014-02-01
    “…Among the species that grow to this size and have been known to attack humans are bull sharks, tiger sharks, and great white sharks. …”
    Get full text
    Article
  9. 389

    Gastroesophageal Reflux Disease and Coronary Heart Disease: Is There a “Mutual Burden” Syndrome? by O. P. Alekseeva, D. V. Pikulev

    Published 2019-09-01
    “…A trigger role of reflux in relation to angina attacks and heart rhythm disturbances has been determined. …”
    Get full text
    Article
  10. 390

    Insilico targeting of virus entry facilitator NRP1 to block SARS-CoV2 entry. by Nousheen Bibi, Maleeha Shah, Shahzad Khan, Muhammad Shahzad Chohan, Mohammad Amjad Kamal

    Published 2025-01-01
    “…SARS-CoV-2, the virus responsible for COVID-19, utilizes the spike (S) protein to attach to and enter host cells. Recent studies have identified neuropilin-1 (NRP1) as a crucial facilitator for the entry of SARS-CoV-2. …”
    Get full text
    Article
  11. 391

    Management of traumatic macular hole and retinal detachment using amniotic membrane transplantation: A case report by Marcus H. Yamamoto, A. Itzam Marin, Irena Tsui

    Published 2025-03-01
    “…The retina remained attached following silicone oil removal. Conclusions and importance: TMH-associated RRDs are rare and challenging to manage due to their complexity and difficult preoperative evaluation. …”
    Get full text
    Article
  12. 392

    Insect Management for Legumes (Beans, Peas) by Susan E. Webb

    Published 2005-09-01
    “… Many different insects attack leguminous vegetables. Aphids damage terminals, whiteflies feed on sap and transmit bean golden mosaic virus, and caterpillars like bean leafroller and beetles feed on leaves. …”
    Get full text
    Article
  13. 393
  14. 394

    Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection by Sulandri Sulandri, Achmad Basuki, Fitra Abdurrachman Bachtiar

    Published 2021-02-01
    “…Intrusion detection is the process of monitoring traffic on a network to detect any data patterns that are considered suspicious, which allows network attacks. This research analyzes the network traffic to find out whether the packet contains intrusion or is a normal packet. …”
    Get full text
    Article
  15. 395

    Neurocranial Pharmacodialysis Device for subarachnoid hemorrhage treatment—a perspective by Nandor Ludvig

    Published 2024-02-01
    “…The RESULTS showed the following four facts: (1) high-grade SAH requiring decompressive craniectomy readily offers, as the last step of the neurosurgical procedure, the safe closure of the opened cranium with the NPD while leaving the efficacy of the decompressive intervention intact. (2) The neurocranially attached NPD can automatically execute, as long as it is necessary, subarachnoid polypharmacy to prevent post-SAH vasospasm, reduce the risk of rebleeding, and provide neuroprotection in delayed cerebral ischemia (DCI), bypassing the blood-brain barrier (BBB) via connected subarachnoid strips. (3) These effects of drug delivery can be optimized with NPD-controlled long-term cleaning of the CSF and drainage of cellular debris, hydrocephalus, and interstitial edema accompanied by the subarachnoid dialysis of potentially neurotoxic extracellular molecules. (4) Safety and efficacy of these NPD operations are monitored, and possible epileptiform EEG is detected, via the wireless EEG system of the device. …”
    Get full text
    Article
  16. 396

    Disaster Planning: Important Papers and Documents by Josephine Turner

    Published 2003-06-01
    “…Whether the disaster is a hurricane, tornado or a terrorist attack preparation is the key to survival and to clean up after the event. …”
    Get full text
    Article
  17. 397

    Ou metodes van die Satan in 'n moderne samelewing - met besondere verwysing na Openbaring 2 en 3 by AH Grové

    Published 2000-12-01
    “…To identify methods used by and explain the way in which Satan operates in order to attack the Christian church in Asia Minor as described in Revelation 2 and 3. 2. …”
    Get full text
    Article
  18. 398

    Enhancing performance of recycled aggregate concrete with supplementary cementitious materials by Abba Fatiha, Ezziane Karim, Adjoudj Mhamed, Abed Farid

    Published 2025-03-01
    “…Unfortunately, RCA is of poor quality due to the presence of old mortar attached to its surface. It is characterized by its low density, high absorption, low rigidity and a poor quality interfacial transition zone (ITZ) which results in a lower quality concrete. …”
    Get full text
    Article
  19. 399

    Does the “state of disaster” response have a downside? Hospital incident command group leaders’ experiences of a terrorist-induced major incident: a qualitative study by Jason P. Murphy, Anna Hörberg, Monica Rådestad RN, Lisa Kurland, Maria Jirwe

    Published 2025-02-01
    “…Participants were members of hospital incident command groups during a terror attack. The interviews were transcribed verbatim and analyzed using deductive content analysis. …”
    Get full text
    Article
  20. 400

    Uji Beberapa Dosis Tepung Daun Gamal (Gliricididia sepium Jacq.) Terhadap Sitophilus oryzae L. Pada Beras Di Penyimpanan by Rusli Rustam, Agus Sutikno, Jamiatul Laila

    Published 2018-03-01
    “…One of the pest that often attack the rice in storage is Sitophilus oryzae L. …”
    Get full text
    Article