Results 111 to 120 of about 1,361,909 (323)

Nutrient concentration age dynamics of teak (Tectona grandis L.f.) plantations in Central America

open access: yesForest Systems, 2013
Aim of study. Appropriate knowledge regarding teak (Tectona grandis L.f.) nutrition is required for a better management of the plantations to attain high productivity and sustainability.
J. Fernandez Moya   +8 more
doaj   +1 more source

A structured, behavioural science approach to the preparation of antimicrobial stewardship interventions for companion animal veterinarians

open access: yesVeterinary Record, EarlyView.
Abstract Background A structured, behavioural science approach was adopted to develop antimicrobial stewardship interventions in UK first‐opinion companion animal veterinary practice. The objectives were to identify behavioural targets for intervention and to understand how practice contexts influence these behaviours.
Ben Walker   +3 more
wiley   +1 more source

General and central obesities were associated with increased risk of inflammatory bowel disease: A large‐scale prospective cohort study

open access: yesVIEW, EarlyView.
Prior evidence suggested inconsistent findings in terms of the relationship between obesity and inflammatory bowel disease (IBD) occurrence. We demonstrated that both general and central obesities were associated with an increased risk of developing IBD, ulcerative colitis, and Crohn's disease in a large‐scale prospective cohort.
Qian Zhang   +5 more
wiley   +1 more source

The state of Soviet agriculture in the post-war years in the estimates of the CIA

open access: yesStudia Humanitatis
The article examines the process of the CIA’s analytical intelligence on the issue of the Soviet agriculture. American analysts investigated the intensification of this industry, its weaknesses and strengths, as well as the possibility of using the ...
Mamedov Zaur Imalverdi oglu
doaj  

INTELLIGENCE, SECURITY CULTURE AND PUBLIC PERCEPTION [PDF]

open access: yesRomanian Intelligence Studies Review
This article examines the concept of security culture through a multidisciplinary lens, combining theoretical insights with case studies and empirical data.
Bogdan GHEORGHIȚĂ
doaj  

FAKTOR FAKTOR YANG MEMPENGARUHI TINGKAT KECACATAN PADA PASIEN MORBUS HANSEN DI KOTA BANDA ACEH [PDF]

open access: yes, 2012
ABSTRAKPenyakit Morbus Hansen tidak hanya menimbulkan kerusakan pada kulit penderita, tetapi juga dapat menimbulkan kecacatan sehingga penderita di isolasi secara sosial. Penelitian ini bertujuan untuk mengetahui pengaruh tipe Morbus Hansen, deteksi dini,
HAFNI CIA MASYITHAH
core  

A New Generation of Cool White Dwarf Atmosphere Models Using Ab Initio Calculations

open access: yes, 2016
Due to their high photospheric density, cool helium-rich white dwarfs (particularly DZ, DQpec and ultracool) are often poorly described by current atmosphere models.
Blouin, Simon   +2 more
core  

Personality Disruption as Mental Torture: The CIA, Interrogational Abuse, and the U.S. Torture Act [PDF]

open access: yes, 2019
This Article is a contribution to the torture debate. It argues that the abusive interrogation tactics used by the United States in what was then called the “global war on terrorism” are, unequivocally, torture under U.S. law. To some readers, this might
Luban, David, Newell, Katherine S.
core   +1 more source

Bio‐Inspired Optimisation Methods Applied to Low Carbon Power and Energy Problems: A Survey

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Bio‐inspired optimisation methods have been widely applied to complex real‐world problems, particularly in low‐carbon power and energy systems, where optimisation tasks often involve high‐dimensional, constrained and mixed‐integer characteristics.
Tianyu Hu   +4 more
wiley   +1 more source

AT‐AER: Adversarial Training With Adaptive Example Reuse

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial training (AT) is widely regarded as a crucial defense method for deep neural networks against adversarial attacks. Most of the existing AT methods suffer from the problems of insufficient coverage of perturbation space and robust overfitting.
Meng Hu   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy