-
41
-
42
-
43
Herbicides to Kill Invasive Trees in Home Landscapes and Surrounding Natural Areas
Published 2016-08-01“…This 5-page fact sheet is a major revision that discusses different herbicides, hand-pulling, stump grinding, foliar herbicide application, cut stump herbicide application, basal bark herbicide application, hack-and-squirt, frill, or girdle herbicide application, licenses and training, and control of specific invasive plants. …”
Get full text
Article -
44
Herbicides to Kill Invasive Trees in Home Landscapes and Surrounding Natural Areas
Published 2016-08-01“…This 5-page fact sheet is a major revision that discusses different herbicides, hand-pulling, stump grinding, foliar herbicide application, cut stump herbicide application, basal bark herbicide application, hack-and-squirt, frill, or girdle herbicide application, licenses and training, and control of specific invasive plants. …”
Get full text
Article -
45
Chrudimský Kristus a zázračné souřadnice jeho barokní legendy
Published 2009-06-01“…The result of this physical iconoclastic disgrace made on the artwork was an ineffaceable bloody hack on the temple of St. Salvator and some other transformations of his face. …”
Get full text
Article -
46
Characterization of the complete chloroplast genome of Chasmanthium latifolium (Michx.) H.O.Yates, 1966 (Poaceae)
Published 2025-03-01“…Phylogenetic analyses showed that Chasmanthium latifolium and Chasmanthium laxum clustered into a separate clade with the closest affinity to the clade comprising Zeugites pittieri Hack and Lophatherum gracile Brongn. In conclusion, our study describes the complete chloroplast genome of Chasmanthium latifolium for the first time, contributing to a better understanding of its taxonomy and evolution.…”
Get full text
Article -
47
Exploring Primary Care Streaming Pathway in Emergency Departments in Saudi Arabia: A Qualitative Study
Published 2023-01-01“…Although, in one hospital, some nurses hack the system to manage the flow of patients based on their intuition. …”
Get full text
Article -
48
Blockchain technology in healthcare strengthening: The Nigerian case
Published 2024-12-01“…Blockchain technology is a distributed ledger digital system that records all transactions on a network of interconnected systems in a way that is impossible to edit or hack. When blockchain is mentioned, thoughts of cryptocurrency pop into mind, but blockchain holds vast possibilities in other facets, such as big data analytics, research, the Internet of Things, healthcare, etc. …”
Get full text
Article -
49
Ethiopian Water Hyacinth Leaf Extract as a Potential Tannery Effluent Treatment Material
Published 2022-01-01“…Treated and untreated tannery effluents were compared using standard methods such as SLC 22, SLC 8, APHA 2540C, APHA 2540D, and Hack LCK 139 to determine Cr6+, Cr3+, TDS, TSS, and TKN, respectively. …”
Get full text
Article -
50
Title not available
Published 2017-08-01“…S, Westen, A. Stein, A. Hack, A. (2010). Lanslidesusceptibility assessment using logistic regression and its comparison with a rock mass classification system, along road section in the northern Himalayas (India). …”
Get full text
Article -
51
Genome-Wide Identification and Expression Profiling of the <i>SPL</i> Transcription Factor Family in Response to Abiotic Stress in Centipedegrass
Published 2024-12-01“…Although it has been identified across a wide array of plant species, there have been no comprehensive studies on the <i>SPL</i> gene family in centipedegrass [<i>Eremochloa ophiuroides</i> (Munro) Hack.], which is an important warm-season perennial C4 turfgrass. …”
Get full text
Article -
52
Exploring and collecting perennial forage and grain legume crop genetic diversity in Voronezh and Tambov provinces (Results of the collecting mission, 2016)
Published 2019-06-01“…., F. valesiaca Gaudin. and F. pseudovina Hack. ex Wiesb.); a perennial form of Medicago lupulina L.; a sample of Lotus corniculatus L. found on chalky outcrops of the Kalach Hills; red (Trifolium pratense L.), golden (T. aureum Pollich.) and strawberry (T. fragiferum L.) clovers from the valley of the Khoper River; pisiform vetch (Vicia pisiformis L.) from Kalach District and hairy vetch (V. villosa Roth) from Povorino District of Voronezh Province. …”
Get full text
Article -
53
Competitive Pasture Species to Suppress the Growth of Annual Riceflower (<i>Pimelea trichostachya</i> Lindl.) at Different Planting Densities and Spatial Arrangements
Published 2024-12-01“….), sabi grass (<i>Urochloa mosambicensis</i> Hack.), and buffel grass (<i>Pennisetum ciliare</i> L.) against the toxic annual riceflower (<i>Pimelea trichostachya</i> Lindl.) at varying planting densities and ratios. …”
Get full text
Article -
54
Resource potential of some species of the genus Miscanthus Anderss. under conditions of continental climate of West Siberian forest-steppe
Published 2018-08-01“…(silvergrass) comprises ca. 14–20 species including M. sacchariflorus (Maxim.) Hack., M. sinensis Anderss., M. purpurascens Anderss, and M. × giganteus, which appear to be an almost inexhaustible source of sustainable raw material, and several Miscanthus species were investigated as a potential biofuel energy crop with commercially viable way of its producing. …”
Get full text
Article -
55
Advanced methodologies and technologies in government and society /
Published 2019Table of Contents: “…Taiwo -- Young people, civic participation, and the Internet / Fadi Hirzalla, Shakuntala Banaji -- Community outreach / Loriene Roy, Antonia Frydman -- Exploring "hacking," digital public art, and implication for contemporary governance / Amadu Wurie Khan, Chris Speed -- Political context elements in public policy of radio frequency information technology and electromagnetic fields / Joshua M. …”
View in OPAC
Book -
56
Advanced methodologies and technologies in government and society /
Published 2019Table of Contents: “…Taiwo -- Young people, civic participation, and the Internet / Fadi Hirzalla, Shakuntala Banaji -- Community outreach / Loriene Roy, Antonia Frydman -- Exploring "hacking," digital public art, and implication for contemporary governance / Amadu Wurie Khan, Chris Speed -- Political context elements in public policy of radio frequency information technology and electromagnetic fields / Joshua M. …”
View in OPAC
Book -
57
An intrusion detection model based on convolution neural network for Internet of vehicles
Published 2024-12-01“…The CNES achieves F1 score of 100% on Car-Hacking dataset.…”
Get full text
Article -
58
الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى
Published 2019-10-01“…The present study aims at recognizing to an extreme the Arab communityis aware of how to protect their accounts and ways of penetration (hacking) ofprivacy on a general level and focusing on social engineering on particular. …”
Get full text
Article -
59
الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتأثیرها على المجتمع العربى
Published 2018-07-01“…The present study aims at recognizing to extreme the Arab community isaware of how to protect their personal accounts and ways of penetration(hacking) of privacy on general level and focusing on social engineering onparticular. …”
Get full text
Article -
60
Approaches to cyber weapons classification problem
Published 2013-04-01“…Working criteria for differentiation between information warfare and practical cyber warfare is suggested for proper classification of malware, espionage toolkits, hacking tools and combat software.…”
Get full text
Article