Results 81 to 90 of about 568,315 (281)

Scaling from microsite to landscape to resolve litter decomposition dynamics in globally extensive drylands

open access: yesFunctional Ecology, EarlyView.
Read the free Plain Language Summary for this article on the Journal blog. Abstract Decomposition is the transformation of dead organic matter into its inorganic constituents. In most biomes, decomposition rates can be accurately predicted with simple mathematical models, but these models have long under‐predicted decomposition in globally extensive ...
Heather L. Throop   +8 more
wiley   +1 more source

Evolución de las bases de datos jurídicas en España

open access: yesAnales de Documentación, 2004
Se presenta el camino recorrido en el desarrollo de las bases de datos jurídicas en España, un sector de indudable relevancia en el mercado de la información.
María Luisa Alvite Díez
doaj  

Long‐term trends of epibionts reflect Mediterranean striped dolphin abundance shifts caused by morbillivirus epidemics

open access: yesJournal of Animal Ecology, EarlyView.
This original research piece demonstrates, through empirical and theoretical modelling approaches, that the epibionts of striped dolphins indicate dolphin abundance shifts caused by epidemics of dolphin morbillivirus (DMV). In addition, we provide the first SIR model to investigate the epidemiology of DMV in western Mediterranean striped dolphins ...
Sofía Ten   +4 more
wiley   +1 more source

Las bases de datos descriptivas: Un diseño de Modelo conceptual orientado a objetos

open access: yese-Ciencias de la Información, 2017
El presente artículo teórico es resultado de una investigación que conjuga la Ingeniería de Sistemas y la Bibliotecología; muestra una aproximación interdisciplinaria ante la problemática que presentan las bases de datos descriptivas de la biblioteca ...
Lizbeth Berenice Herrera Delgado
doaj   +1 more source

In Defence of Food: A Comparative Study of Conversas' and Moriscas' Dietary Laws as a Form of Cultural Resistance in the Early Modern Crown of Aragon

open access: yesGender &History, EarlyView.
ABSTRACT This research explores the adaptive strategies employed by Conversas (Christian women of Jewish origin) and Moriscas (Christian women of Muslim origin) in navigating adversity, particularly in their interactions with inquisitorial authorities in the early modern Crown of Aragon. This study analyses these women's efforts to uphold religious and
Ivana Arsić
wiley   +1 more source

Rehabilitation services and related health databases, Japan. [PDF]

open access: yesBull World Health Organ, 2022
Yamaguchi K   +7 more
europepmc   +1 more source

Un método de fragmentación híbrida para bases de datos multimedia

open access: yesDyna, 2016
La fragmentación híbrida es una técnica reconocida para lograr la optimización de consultas tanto en bases de datos relacionales como en bases de datos orientadas a objetos.
Lisbeth Rodríguez-Mazahua   +4 more
doaj   +1 more source

Sperm Transfer Under Behavioral and Morphological Constraints in the Orb‐Web Spider Genus Argiope

open access: yesIntegrative Zoology, EarlyView.
The polygamous mating system of the orb‐web spider genus Argiope provides a model to study the evolution of sperm transfer under morphological and behavioral constraints. This helps us to understand how male and female behavioral and morphological reproductive traits influence sperm transfer.
Chathuranga Dharmarathne   +3 more
wiley   +1 more source

Diagnostic validation of the 00325 Inadequate Self‐Compassion

open access: yesInternational Journal of Nursing Knowledge, EarlyView.
Abstract Background Self‐compassion is an essential component of self‐care. Recognizing it as a nursing diagnosis can promote interventions to address Inadequate Self‐Compassion. Aim This study aims to clinically validate the new NANDA‐I diagnosis (00325) Inadequate Self‐Compassion.
Aarón Muñoz‐Devesa   +5 more
wiley   +1 more source

Vulnerabilidad de sistemas gestores de bases de datos

open access: yesUniciencia, 2008
Existe una constante preocupación por la seguridad de las bases de datos; muchas veces la seguridad se ve afectada por la configuración de los procesos de conexión.
Johnny Villalobos Murillo
doaj  

Home - About - Disclaimer - Privacy