Showing 481 - 500 results of 645 for search 'ATTAC*', query time: 0.07s Refine Results
  1. 481

    An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3) by Kisakye Diana Michelle, Ocen Gilbert Gilibrays, Odongtoo Godfrey

    Published 2024-12-01
    “…As digital data continues to be transmitted between devices, it is vulnerable to attack, making text steganography an essential tool for securing data. …”
    Get full text
    Article
  2. 482

    Tawny Crazy Ant by Stephanie K. Hill, Rebecca W. Baldwin, Roberto M. Pereira, Philip G. Koehler

    Published 2015-08-01
    “…This species infests buildings and greenhouses, attacks crops, domestic animals, honeybee hives, displaces native ant species, and disrupts electrical equipment. …”
    Get full text
    Article
  3. 483

    More on stubs in open string field theory by Martin Schnabl, Georg Stettinger

    Published 2025-02-01
    “…Abstract We continue our analysis of open string field theory based on A ∞ -algebras obtained from Witten’s theory by attaching stubs to the elementary vertex. Classical solutions of the new theory can be obtained from known analytic solutions in Witten’s theory by applying a cohomomorphism. …”
    Get full text
    Article
  4. 484
  5. 485

    Development of Explosive Strength in the Representative High School Volleyball Team by E.L. Amzar, L. Rada, I.I. Niculescu

    Published 2024-12-01
    “…Motor skills are absolutely necessary for a total participation of the student in all phases of attack and defense. Among these, the value of the motor quality, force, depends on the degree of training and applied efforts, efforts that must be large enough to lead to the development of the student’s moto qualities. …”
    Get full text
    Article
  6. 486

    Ground Pearls, Earth Pearls, Pearl Scale, Margarodes spp. (Insecta: Hemiptera: Margarodidae) by Anthony Camerino

    Published 2004-12-01
    “…The exposed mouthparts are used to feed and attach to the roots of plants. This document is EENY-277, one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  7. 487

    Economic and Clinical Impact of Stroke and Warfarin Use for Patients with Non-valvular Atrial Fibrillation by Li Wang, Elyse Fritschel, Onur Baser

    Published 2013-11-01
    “…Despite the similarity in Charlson Comorbidity Index scores compared to non-stroke controls, stroke patients significantly higher clinical outcome rates during follow-up for acute coronary syndrome (ACS), ischemic attack, major and minor bleeding patients (p-values<0.0100), and the total cost incurred was nearly three times greater ($33,506 vs. $13,921, p-values<0.0001). …”
    Get full text
    Article
  8. 488

    Green Peach Aphid, Myzus persicae (Sulzer) (Insecta: Hemiptera: Aphididae) by John L. Capinera

    Published 2004-04-01
    “… The green peach aphid, Myzus persicae (Sulzer), is found throughout the world, including all areas of North America, where it is viewed as a pest principally due to its ability to transmit plant viruses. In addition to attacking plants in the field, green peach aphid readily infests vegetables and ornamental plants grown in greenhouses. …”
    Get full text
    Article
  9. 489

    Rancang Bangun Case Based Reasoning untuk Diagnosis Hama dan Penyakit Tanaman Nilam menggunakan Nearest Neighbor Kombinasi Certainty Factor by Rabiah Adawiyah, Fitrianti Handayani

    Published 2020-05-01
    “…The development of patchouli plants attacked by pests and diseases is often hampered because there are still many farmers who do not know the types of pests and diseases that attack farmers' crops. …”
    Get full text
    Article
  10. 490

    Common Sharks of Florida by Florida Sea Grant

    Published 2014-02-01
    “…Among the species that grow to this size and have been known to attack humans are bull sharks, tiger sharks, and great white sharks. …”
    Get full text
    Article
  11. 491

    Disaster Planning: Important Papers and Documents by Josephine Turner

    Published 2003-06-01
    “…Whether the disaster is a hurricane, tornado or a terrorist attack preparation is the key to survival and to clean up after the event. …”
    Get full text
    Article
  12. 492

    Data-independent LC-MS/MS analysis of ME/CFS plasma reveals a dysregulated coagulation system, endothelial dysfunction, downregulation of complement machinery by Massimo Nunes, Mare Vlok, Amy Proal, Douglas B. Kell, Etheresia Pretorius

    Published 2024-07-01
    “…Complement machinery was also significantly downregulated, including C9 which forms part of the membrane attack complex. Additionally, we identified a significant upregulation of lactotransferrin, protein S100-A9, and an immunoglobulin variant. …”
    Get full text
    Article
  13. 493

    Mọ́remí or Mọ́rèmí: An Investigation into the Perception Error of a Deified Woman in Ilé-Ifẹ̀ by Ọladiipọ Ajiboye

    Published 2022-01-01
    “… A known fact that has been established is the importance that Africans, especially the Yorùbá attach to names which is that names serve as a form of identification which may depict family heritage and occupation, and such names convey a deep meaning. …”
    Get full text
    Article
  14. 494

    Security protection method based on mimic defense and Paillier encryption for smart IoT terminals by GU Tiansheng, ZENG Fukang, SHAO Sisi, NIE Yijun, JI Zongkai, ZHENG Yulu, SHI Yuchen, LIU Shangdong, JI Yimu

    Published 2024-12-01
    “…During data encryption, it employed blind factor technology to execute a blind signature, rendering ciphertext information indecipherable even if an attacker obtained access to the decryption key of the Paillier encryption algorithm. …”
    Get full text
    Article
  15. 495

    Green Lynx Spider, Peucetia viridans (Hentz) (Arachnida: Araneae: Oxyopidae) by Howard V. Weems, Jr., W. H. Whitcomb

    Published 2004-08-01
    “…Although it is common throughout Florida and aggressively attacks its insect prey, it very seldom bites humans. …”
    Get full text
    Article
  16. 496

    Effects of Coach’s Verbal Encouragement During Small-Sided Volleyball Games on Specific Physical Fitness and Technical-Tactical Behavior of Youth Athletes by Taufiq Hidayat, Irma Febriyanti, Advendi Kristiyandaru, Suroto, Hari Wisnu, Ahmet Kurtoğlu, Amayra Tannoubi, Joseph Lobo, Baglan Yermakhanov, Jarosław Muracki, Edi Setiawan

    Published 2025-01-01
    “…Physical performance including agility t-test (ATT), 10-m sprint test (10-mST), countermovement jump test (CMJT), medicine ball throw test (MBTT), multistage 20-meter shuttle run test (M20-MSRT), and technical-tactical behavior (serve, reception, sets, attack, defense) were measured in pre-test and post-test. …”
    Get full text
    Article
  17. 497

    Gum Drop Technique with Pericardial Membrane for Treating Gingival Recession - A Case Report by Abirami N. P. Rao, Vijayalakshmi Rajaram, Jaideep Mahendra, Pavithra H. Dave, N Ambalavanan, Little Mahendra

    Published 2023-07-01
    “…Probing pocket depth (PPD), clinical attachment level (CAL), recession height (RH), recession width (RW) and keratinized tissue width (KTW) were assessed. …”
    Get full text
    Article
  18. 498

    Ligustrum Weevil (suggested common name), Ochyromera ligustri Warner (Insecta: Coleoptera: Curculionidae: Tychiinae: Tychiini: Endaeina) by James P. Cuda, M. C. Zellar, Michael C. Thomas

    Published 2005-06-01
    “… A seed-attacking weevil was recently found attacking Chinese privet in Tallahassee, Leon County, Florida (Cuda and Zeller 1998). …”
    Get full text
    Article
  19. 499

    Effect of combined oral contraceptives on menstrual migraine frequency and severity: a narrative review by Yethindra Vityala, Ruchika Garg, Samina Ausvi, Manjula Shantaram, Srikanya Tippabathini, Lekhashree Hosur Brahmananda Reddy, Yash Jain, Pavani Jaladi, Sai Praneeth Duvvuri, Krishna Chaitanya Meduri

    Published 2024-09-01
    “…The literature reveals inconsistent results, with some studies reporting aggravation of migraine symptoms with COC use, whereas others indicate a decrease in the frequency and severity of attacks, especially with continuous use. Factors affecting these outcomes include patient age, menstrual cycle characteristics, and migraine type. …”
    Get full text
    Article
  20. 500

    Correlation of Serum and Gingival Crevicular Fluid Levels of Caspase-3 and Milk Fat Globule–Epidermal Growth Factor 8 on Gingival Health by Manonmani Pavithra Ravindran, A Geetha, Sathish Rajendran, Jaideep Mahendra, M Jyothi, Ambalavanan Namasivayam

    Published 2023-10-01
    “…After recording the periodontal parameters (plaque index (PI), modified gingival index (MGI), probing depth (PD) and clinical attachment level (CAL)), the serum and GCF samples were collected and the levels of caspase-3 and MFG-E8 were estimated using enzyme-linked immunoassay (ELISA). …”
    Get full text
    Article