Results 61 to 70 of about 14,258 (256)

Un método de fragmentación híbrida para bases de datos multimedia

open access: yesDyna, 2016
La fragmentación híbrida es una técnica reconocida para lograr la optimización de consultas tanto en bases de datos relacionales como en bases de datos orientadas a objetos.
Lisbeth Rodríguez-Mazahua   +4 more
doaj   +1 more source

Detecting extirpation: A localized approach to a global problem

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
The global biodiversity crisis stems from a cascading series of extirpations driving species toward extinction. Addressing this crisis requires methods for early detection of extinction at local scales, where communities can mobilize conservation efforts.
Andrew D. F. Simon   +4 more
wiley   +1 more source

Evolución de las bases de datos jurídicas en España

open access: yesAnales de Documentación, 2004
Se presenta el camino recorrido en el desarrollo de las bases de datos jurídicas en España, un sector de indudable relevancia en el mercado de la información.
María Luisa Alvite Díez
doaj  

Controlling banana bunchy top disease in Benin: Crop protection strategies with socio‐economic perspectives

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Banana and plantain are vital for food security and income in West Africa, yet banana bunchy top virus (BBTV) threatens production. This study combined remote sensing, field surveys, modelling and socio‐economic analysis to assess BBTV spread and control strategies in Benin.
Renata Retkute   +13 more
wiley   +1 more source

Impact of parameterization in multiple acoustic index comparisons: practical cases in terrestrial and underwater soundscapes

open access: yesRemote Sensing in Ecology and Conservation, EarlyView.
Parameter choices in acoustic analyses (sampling frequency, FFT size and window overlap) strongly influence multivariate soundscape separation. Using terrestrial and coral reef recordings, we show that these settings can exaggerate or mask ecological differences, emphasizing the need for parameter sensitivity testing and transparent reporting in ...
Juan C. Azofeifa‐Solano   +8 more
wiley   +1 more source

Knee height is often right: evaluating device height effects on camera trapping rate

open access: yesRemote Sensing in Ecology and Conservation, EarlyView.
Camera trap deployment height can introduce systematic biases in detection trapping rates across species of different body sizes. Combining 172 paired sampling points in five experiments across Europe, North America and Africa, our results show that low cameras significantly increase detections of small‐ and medium‐sized species, whereas high cameras ...
Jorge Sereno‐Cadierno   +6 more
wiley   +1 more source

Las bases de datos descriptivas: Un diseño de Modelo conceptual orientado a objetos

open access: yese-Ciencias de la Información, 2017
El presente artículo teórico es resultado de una investigación que conjuga la Ingeniería de Sistemas y la Bibliotecología; muestra una aproximación interdisciplinaria ante la problemática que presentan las bases de datos descriptivas de la biblioteca ...
Lizbeth Berenice Herrera Delgado
doaj   +1 more source

Rehabilitation services and related health databases, Japan. [PDF]

open access: yesBull World Health Organ, 2022
Yamaguchi K   +7 more
europepmc   +1 more source

Operationalizing the Metaverse for Urban Sustainability: Evidence From an Expert Panel and the Seoul Metaverse City Case Study

open access: yesSustainable Development, EarlyView.
ABSTRACT Smart cities and urban digital twins have fostered the emergence of immersive environments, such as the metaverse. While contemporary scholarlship has increasingly examined the integration of the metaverse within smart city infrastructures, the critical nexus between urban sustainability and the metaverse remains largely under‐researched. This
Jose Manuel Diaz‐Sarachaga   +1 more
wiley   +1 more source

Vulnerabilidad de sistemas gestores de bases de datos

open access: yesUniciencia, 2008
Existe una constante preocupación por la seguridad de las bases de datos; muchas veces la seguridad se ve afectada por la configuración de los procesos de conexión.
Johnny Villalobos Murillo
doaj  

Home - About - Disclaimer - Privacy