Showing 521 - 540 results of 645 for search 'ATTAC*', query time: 0.05s Refine Results
  1. 521

    Small Elegies for America by Lindsey Freeman

    Published 2025-02-01
    “…In this essay, focusing on the artists Michael Paul Smith, Thomas Dolye, and James Casebere, the imaginations that encircle homes, neighborhoods, and small towns are complicated through utopian and dystopian art works that draw attention to past attachments to the future and the need for large changes now. …”
    Get full text
    Article
  2. 522

    INFLUENCE OF FIRM CHARACTERISTICS ON LOAN APPROVAL FOR SMEs IN NORTH CENTRAL NIGERIA: BANKERS’ PERCEPTION by Lukman Adebayo Oke, Yusuf Olamilekan Quadri, Daud Omotosho Saheed

    Published 2023-11-01
    “…The study concluded that while banks attach greater importance to firm size, firm age and location in their loan decision for SMEs, they also give consideration though lesser, to other factors. …”
    Get full text
    Article
  3. 523

    Cassia leptophylla, Gold Medallion Tree by Michael G. Andreu, Melissa H. Friedman, Robert J. Northrop

    Published 2012-10-01
    “…Pruning the tree to one main leading stem from which major branches are attached can help increase its strength and sturdiness against strong wind events. …”
    Get full text
    Article
  4. 524

    Implementasi Metode Longest Common Subsequences untuk Perbaikan Kata pada Kasus Analisis Sentimen Opini Pembelajaran Daring di Media Sosial Twitter by Alfisyar Jefry Pranata, Yuita Arum Sari, Edy Santoso

    Published 2022-02-01
    “…Abstract  Coronavirus is a parasite that attacks the human respiratory system. The increase incases coronavirus took place very fast and spread to various countries. …”
    Get full text
    Article
  5. 525

    Hydrilla leafcutter moth (unofficial common name); Parapoynx diminutalis Snellen (Insecta: Lepidoptera: Crambidae) by Julie Baniszewski, Emma N.I. Weeks, James P. Cuda

    Published 2020-05-01
    “…The aquatic larvae commonly attack hydrilla and other aquatic plants. The moth was identified in 1971 in India and Pakistan during scouting trips to attempt to determine potential biological control agents for hydrilla. …”
    Get full text
    Article
  6. 526

    Cyberbullying by Kate Fogarty

    Published 2012-08-01
    “…This involves put-downs, publicly sharing personal information, stalking, and other overt attacks upon a person, all using electronic communication.” …”
    Get full text
    Article
  7. 527

    Phenotypic and transcriptomic analyses reveal major differences between apple and pear scab nonhost resistance by Vergne, Emilie, Chevreau, Elisabeth, Ravon, Elisa, Gaillard, Sylvain, Pelletier, Sandra, Bahut, Muriel, Perchepied, Laure

    Published 2023-01-01
    “…Apple (Malus x domestica Borkh.) have a nonhost resistance to Venturia pyrina, the scab species attacking European pear (Pyrus communis L.). Reciprocally, P. communis have a nonhost resistance to Venturia inaequalis, the scab species attacking apple. …”
    Get full text
    Article
  8. 528

    The 'Rush Hour' of Life: Insecurities and Strains in Early Life Phases as a Challenge for a Life Course-Oriented, Sustainable Social Policy by Ute Klammer

    Published 2009-06-01
    “…If uncertain labour market attachment occurs in the stage of family planning, the resulting insecurity and uncertainty can lead to special challenges where professional and private demands have to be reconciled (the ‘rush hour’ of life). …”
    Get full text
    Article
  9. 529

    Nematode Management for Bedding Plants by William T. Crow

    Published 2014-02-01
    “…Due to warm temperatures, sandy soil, and humidity, Florida has more than its fair share of pests and pathogens that attack bedding plants. Plant-parasitic nematodes can be among the most damaging and hard-to-control of these organisms. …”
    Get full text
    Article
  10. 530

    Insect Management for Cucurbits (Cucumber, Squash, Cantaloupe, and Watermelon) by Susan E. Webb

    Published 2005-12-01
    “…Pickleworm and melonworm rarely attack watermelon. This document is ENY-460, one of a series of the Entomology and Nematology Department, UF/IFAS Extension. …”
    Get full text
    Article
  11. 531

    THE MENACE OF BANDITRY AND KIDNAPPING IN NIGERIA: AN ASSESSMENT OF SHEIKH GUMI'S MEDIATORY ROLE IN THE RELEASE OF GREENFIELD UNIVERSITY KIDNAPPED STUDENTS by SOLOMON AYANTAYO OJO, OLUSEGUN STEVE ADEGOKE

    Published 2025-01-01
    “… The increase in banditry and kidnapping in Nigeria has created significant security challenges in recent years, particularly with attacks on educational institutions where students are abducted for ransom. …”
    Get full text
    Article
  12. 532

    Cassia leptophylla, Gold Medallion Tree by Michael G. Andreu, Melissa H. Friedman, Robert J. Northrop

    Published 2012-10-01
    “…Pruning the tree to one main leading stem from which major branches are attached can help increase its strength and sturdiness against strong wind events. …”
    Get full text
    Article
  13. 533

    An Efficient and Hybrid Deep Learning-Driven Model to Enhance Security and Performance of Healthcare Internet of Things by Muhammad Babar, Muhammad Usman Tariq, Basit Qureshi, Zabeeh Ullah, Fahim Arif, Zahid Khan

    Published 2025-01-01
    “…Secondly, a security module based on Bidirectional Long Short-Term Memory (BiLSTM) is implemented to recognize various forms of attacks within the H-CIoT network. Third, the past medical records of the patients are used to train the DL model. …”
    Get full text
    Article
  14. 534

    Insect Management for Celery and Parsley by Susan E. Webb

    Published 2002-07-01
    “…Many other insects may occasionally attack these crops but seldom cause economic damage. …”
    Get full text
    Article
  15. 535

    Beyond nutritional immunity: immune-stressing challenges basic paradigms of immunometabolism and immunology by Edmund K. LeGrand

    Published 2025-02-01
    “…Since immune cells actively controlling pathogens (effector cells) typically do not proliferate at infected sites, there is a “stress vulnerability gap” wherein proliferating pathogens are more vulnerable to any type of stress than are the attacking effector cells. Hosts actively stress vulnerable proliferating pathogens by restricting resources (resource-limiting stress) and generating noxious waste products (damaging/disruptive stress) in a fundamental defense here-in termed “immune-stressing.” …”
    Get full text
    Article
  16. 536

    Batch-in-Batch: a new adversarial training framework for initial perturbation and sample selection by Yinting Wu, Pai Peng, Bo Cai, Le Li

    Published 2025-01-01
    “…Through extensive experiments on three benchmark datasets with two network architectures in both single-step (Noise-Fast Gradient Sign Method, N-FGSM) and multi-step (Projected Gradient Descent, PGD) scenarios, models trained within the BB framework consistently demonstrate superior adversarial accuracy across various adversarial settings, notably achieving an improvement of more than 13% on the SVHN dataset with an attack radius of 8/255 compared to N-FGSM. The analysis further demonstrates the efficiency and mechanisms of the proposed initial perturbation design and sample selection strategies. …”
    Get full text
    Article
  17. 537

    Advanced Techniques for Glucose Oxidase Immobilization: Evolution, Computational Integration, and Biomedical Applications by G Sreenivasulu, R. Ramakoteswara Rao

    Published 2024-09-01
    “…Immobilization, which involves attaching enzymes to surfaces, is a key method that enhances glucose oxidase's activity, stability, and reusability, making it more practical for repeated industrial use. …”
    Get full text
    Article
  18. 538
  19. 539

    The concept of vulnerability and its relation to equality in the context of human rights: cases from climate change, anti-discrimination and asylum by Monika Mayrhofer, Margit Ammer, Katrin Wladasch

    Published 2025-02-01
    “…The case studies show that vulnerability is a fuzzy concept, which often ends up being attached to ‘special-needs groups’ and which frequently mobilizes stigmatizing and stereotyping narratives. …”
    Get full text
    Article
  20. 540

    An Endometrioid Ovary Cyst and Fallopian Tube in the Inguinal Canal: Conservative or Surgical Management? by Sema Ovalı, Ahmet Yılmaz, Gürkan Zorlu

    Published 2015-04-01
    “…Absence of the left ovary had been noted during previous cesarean sections and she had two attacks of pelvic inflammatory disease. She could not get pregnant through natural route and ovulation induction treatment was initiated upon which a left inguinal mass appeared. …”
    Get full text
    Article