To see the other types of publications on this topic, follow the link: Attack by observation.

Journal articles on the topic 'Attack by observation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Attack by observation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Adus, Emilia Hatija, and Yustina Pu'u. "POPULASI DAN TINGKAT SERANGAN HAMA KUTU PUTIH Dysmicoccus brevipes (Hemiptera : Pseudociccidae) PADA TANAMAN JAHE (Zingiber officinalle Rosc) DI DESA NUAMURI KECAMATAN KELIMUTU." AGRICA 14, no. 1 (2021): 59–66. http://dx.doi.org/10.37478/agr.v14i1.1037.

Full text
Abstract:
This study aims to determine the population and level of attack of mealybug pests on ginger plants during harvesting in Nuamuri Village, Kelimutu District, Ende Regency. This research was carried out from February 2020 to July 2020, in Detubewa village, Nuamaro village and Nuamuri village. Observations were made by directly counting pests and damaged and attacked rhizomes, using the path method. Data analysis used is data obtained from the location of observations in tabulation based on the results of direct observations in the field. What was observed was the population and attack rate of eac
APA, Harvard, Vancouver, ISO, and other styles
2

Fernandes, Andrian, and Ngatiman . "PATTERNS OF Coptotermes sp. TERMITE ATTACK ON Shorea leprosula Miq IN KHDTK SEBULU, EAST KALIMANTAN." KnE Life Sciences 2, no. 1 (2015): 544. http://dx.doi.org/10.18502/kls.v2i1.213.

Full text
Abstract:
<p>Red meranti (Shorea leprosula Miq) as a major commercial timber has been widely planted in Dipterocarp forests. Coptotermes sp. termite often attacks S. leprosula Miq to its death, but the attack patterns are unknown. This research aims to get data on the frequency, intensity, and patterns of Coptotermes sp. attack in KHDTK Sebulu, East Kalimantan. Methods used were observation, recording, and mapping on S. leprosula Miq trees attacked by termites in KHDTK Sebulu. The results showed that the frequency of termite attacks on S. leprosula Miq in KHDTK Sebulu was 6.4-30.5% and termite att
APA, Harvard, Vancouver, ISO, and other styles
3

Kruszewski, Piotr, Carlos Bordini, Alf O. Brubakk, and Ottar Sjaastad. "Cluster Headache: Alterations in Heart Rate, Blood Pressure and Orthostatic Responses During Spontaneous Attacks." Cephalalgia 12, no. 3 (1992): 172–77. http://dx.doi.org/10.1046/j.1468-2982.1992.1203172.x.

Full text
Abstract:
Changes in heart rate and blood pressure (BP) have been monitored beat-to-beat in a cluster headache patient with and without attacks using a non-invasive Doppler servo method. Two attacks were monitored and during one of them a tilt test was carried out. The variability of heart rate and BP was greater during the attack than during the interparoxysmal period. A marked bradycardia occurred during attacks. Systolic BP increased slightly. There was no heart rate increase after tilting during the attack, whereas this was present invariably during tests carried out interparoxysmally. BP changes du
APA, Harvard, Vancouver, ISO, and other styles
4

Zulaikha, Eva, Arneti Arneti, and Munzir Busniah. "Menguji Tingkat Serangan Wereng Batang Coklat Nilaparvata lugens Stal (Hemiptera: Delphacidae) pada Varietas Padi Asal Pasaman di Rumah Kaca." JPT : JURNAL PROTEKSI TANAMAN (JOURNAL OF PLANT PROTECTION) 5, no. 1 (2021): 55. http://dx.doi.org/10.25077/jpt.5.1.55-59.2021.

Full text
Abstract:
Brown planthopper (BPH) is a major pest on rice plants that can cause hopperburn and crop failure. The study aimed to determine the level of BPH attack on several local rice varieties in the Pasaman Regency. This research was conducted in a greenhouse, Faculty of Agriculture, Universitas Andalas, using a completely randomized design (CRD), with five treatments and five replications. The treatments were four different rice varieties from Pasaman and control (Siganteng, Pulau Batu, Mundam Kuning, Mundam Putih, IR 42). BPH was infested when the rice was five days after sowing. Observation paramet
APA, Harvard, Vancouver, ISO, and other styles
5

Conti, Gustavo De Conti Teixeira Costa, Henrique De Oliveira Castro Castro, Auros Barreiros Freire Freire, et al. "High level of Brazilian men´s volleyball: characterization and difference of predictive factors of back row attack." Motricidade 14, no. 1 (2018): 58. http://dx.doi.org/10.6063/motricidade.12221.

Full text
Abstract:
This study aimed to identify the predictive factors of attacks, performed from positions 1 and 6 according to the effect of reception in high level Brazilian male volleyball and to find the predictive factors that differentiate the game practiced from these positions. The sample consisted in the observation of 142 games of the Brazilian Men's Super League, totalling 2969 actions of reception, setting and attack from positions 1 and 6. The significance value adopted was 5% (p ≤ 0.05). The analysis of the predictive factors of the game performed by the attacker of position 1 showed greater chanc
APA, Harvard, Vancouver, ISO, and other styles
6

Utami, Sri, and Agus Ismanto. "SERANGAN HAMA DEFOLIATOR PADA BIBIT TANAMAN KEHUTANAN." JURNAL HUTAN PULAU-PULAU KECIL 1, no. 2 (2016): 97. http://dx.doi.org/10.30598/jhppk.2016.1.2.97.

Full text
Abstract:
One of the efforts to support the success of forest plantation development is the availability of quality seeds (free from pests and diseases and have the ability to grow good). Defoliator pests is one of the problems frequently encountered pest attack seedlings in the nursery. Defoliator pest attacks will result in the failure of seedlings. The study was conducted at Modern Nursery located in the Sukamoro Village, Banyuasin, South Sumatra Province from February to May 2013. The purpose of the study was to analize the pest which attacks some seedlings e.g. Jabon (Anthocephalus cadamba), kayu b
APA, Harvard, Vancouver, ISO, and other styles
7

Conti, Gustavo, Auro Freire, Breno Evangelista, Gustavo Pedrosa, Herbert Ugrinowitsch, and Henrique Castro. "Brazilian high-level men’s volleyball." Kinesiology 50, no. 2 (2018): 211–17. http://dx.doi.org/10.26582/k.50.2.4.

Full text
Abstract:
The present study aimed to characterize and differentiate between the predictive factors of the attacks performed by the opposite player from positions 1 and 2. The sample consisted of the observation records of 142 volleyball games of the Brazilian Men’s Super-League season 2014/2015, totaling 8,010 actions of reception, setting and attack, with 5,965 actions from position 2 and 2,045 from position 1. The analysis of the predictive factors of the opposite player’s attack, according to the position of the attack, showed that the attacks from position 2 are more likely to occur after reception
APA, Harvard, Vancouver, ISO, and other styles
8

He, Gao Feng, Tao Zhang, Yuan Yuan Ma, and Jia Xuan Fei. "Protecting User’s Privacy from Browser-Based Attacks." Applied Mechanics and Materials 631-632 (September 2014): 941–45. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.941.

Full text
Abstract:
Recently there has been a new kind of attacks, browser-based attacks, against anonymous communication systems, such as Tor. This kind of attacks exploits JavaScript in the browser or the HTML meta refresh to generate some predefined signals to correlate users and their visited websites. A novel and efficient defense against such attacks is proposed in this paper. Our main observation is that the attacker must generate enough signals from the client site (the browser) to correlate the user and the website while we can detect the attack at the client site. More specifically, when a user is brows
APA, Harvard, Vancouver, ISO, and other styles
9

Costa, Gustavo De Conti Teixeira, Breno Ferreira de Britto Evangelista, Mariana Pereira Maia, et al. "Voleibol: análise do ataque realizado a partir do fundo da quadra na Superliga Masculina Brasileira." Brazilian Journal of Kinanthropometry and Human Performance 19, no. 2 (2017): 233. http://dx.doi.org/10.5007/1980-0037.2017v19n2p233.

Full text
Abstract:
DOI: http://dx.doi.org/10.5007/1980-0037.2017v19n2p233 The aim of this study was to identify the effect of attacks from positions 1 and 6 in high-level Brazilian Men’s Volleyball in order to understand the offensive structure of the game. The sample was composed of the observation of 142 2014-2015 Men’s Superleague games, totaling 2969 reception, set and attack actions from positions 1 and 6. The results showed association between place of attack, attack tempo, type of attack and effect of attack (p<0.001). The results showed that the point of attack, when it is performed from position 6, i
APA, Harvard, Vancouver, ISO, and other styles
10

Lemos, Walkymário Paulo, José Cola Zanuncio, and José Eduardo Serrão. "Attack behavior of Podisus rostralis (Heteroptera: Pentatomidade) adults on caterpillars of Bombyx mori (Lepidoptera: Bombycidae)." Brazilian Archives of Biology and Technology 48, no. 6 (2005): 975–81. http://dx.doi.org/10.1590/s1516-89132005000800014.

Full text
Abstract:
Attack behavior of the predator Podisus rostralis (Stäl) (Heteroptera: Pentatomidae) adults on fourth instar Bombyx mori L. (Lepidoptera: Bombycidae) caterpillars was studied in laboratory conditions. Ten 24 hours old adults of this predator were observed during two hours with the following attack behavior: (1) Predator: prey finding; prey observation; touching prey with antenna; attack behavior; prey paralysis; predator retreat after attack; attack cessation; successive attacks; and (2) Prey: defense. The predator P. rostralis found its prey before attacking and it approached it with slow cir
APA, Harvard, Vancouver, ISO, and other styles
11

Subroto, Gatot, Dwi Erwin Kusbianto, Sholeh Avivi, Slameto Slameto, and Setiyono Setiyono. "Correlation Between Secondary Metabolites of Leaf and the Resistance to Leaf Rust (Hemileia vastatrix) on Several Arabica Coffee Clones." Ilmu Pertanian (Agricultural Science) 4, no. 2 (2019): 71. http://dx.doi.org/10.22146/ipas.42124.

Full text
Abstract:
Indicator of coffee resistance to leaf rust attack (Hemileia vastatrix) is needed to select superior coffee plants resistant to biotic stress. This study aims to find the relationship between the content of secondary metabolites and the intensity of leaf rust attack, so that it becomes a reference in the selection of future coffee plants. The experimental design used was a completely randomized design (CRD) with several coffee clones as a treatment. This test tested 5 Arabica coffee clones consisting of Komasti, Maragogik, Usda, Andong sari, and HDT clones. Each consists of 3 replications, and
APA, Harvard, Vancouver, ISO, and other styles
12

Alsuhibany, Suliman A. "A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack." Security and Communication Networks 2021 (January 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/6653076.

Full text
Abstract:
Authentication in mobile devices is inherently vulnerable to attacks and has the weakness of being susceptible to shoulder-surfing attack. Shoulder-surfing attack is a type of attack that uses direct observation techniques such as looking over someone’s shoulder to get information. This paper aims to introduce a novel way of concealing the password within a contingent of randomly selected entries. In particular, the traditional password concept where what you input is what you get is redefined by proposing the camouflage characters approach. Based on this approach, three defensive techniques a
APA, Harvard, Vancouver, ISO, and other styles
13

Yang, Zhichao, Rongmao Chen, Chao Li, Longjiang Qu, and Guomin Yang. "On the Security of LWE Cryptosystem against Subversion Attacks." Computer Journal 63, no. 4 (2019): 495–507. http://dx.doi.org/10.1093/comjnl/bxz084.

Full text
Abstract:
Abstract Subversion of cryptography has received wide attentions especially after the Snowden Revelations in 2013. Most of the currently proposed subversion attacks essentially rely on the freedom of randomness choosing in the cryptographic protocol to hide backdoors embedded in the cryptosystems. Despite the fact that significant progresses in this line of research have been made, most of them mainly considered the classical setting, while the research gap regarding subversion attacks against post-quantum cryptography remains tremendous. Inspired by this observation, we investigate a subversi
APA, Harvard, Vancouver, ISO, and other styles
14

Sharma, Komal, and Anuradha Saini. "Critical Analysis of Numerous Attacks Irreverent Security in Remote Sensor Networks." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (2018): 68. http://dx.doi.org/10.23956/ijarcsse.v8i4.634.

Full text
Abstract:
Remote Sensor Networks have risen as innovation of the current century and has givenan intense blend of dispersed detecting, figuring and correspondence of attacks. With its developing application regions, especially in mission-basic applications, for example, military observing frameworks and war zone observation, security has turned into a critical need keeping in mind the end goal to ensure the touchy information included. The need of viable and effective security systems is necessary and to secure sensor systems has pulled in a lot of scientists' consideration making it hot research zone i
APA, Harvard, Vancouver, ISO, and other styles
15

Dhena, Emanuel Randy, and Yustina Maria Silvia Wonga Puu. "INVENTARISASI DAN IDENTIFIKASI HAMA DAN PENYAKIT UTAMA TANAMAN JAGUNG (Zea mays L.)." AGRICA 4, no. 2 (2020): 155–65. http://dx.doi.org/10.37478/agr.v4i2.461.

Full text
Abstract:
This research was carried out in order to understand the main types of pests and diseases that affect corn, which types are most dominant and to understand the severity of these main diseases in corn. Observation of variables involved the identification of pests and diseases that attacked corn plants, the diversity of these pests and diseases as well as the intensity of the damage caused by these pests and diseases. The results of this research showed that the main type of pest and disease that attacks corn are, among others: seedling flies (Atherigonasp), grasshoppers (Oxyasp), corn stalk dri
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Dong, Xiaosong Zhang, Jiang Ming, Ting Chen, Chao Wang, and Weina Niu. "Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device." Wireless Communications and Mobile Computing 2018 (July 4, 2018): 1–15. http://dx.doi.org/10.1155/2018/7849065.

Full text
Abstract:
Firmware vulnerability is an important target for IoT attacks, but it is challenging, because firmware may be publicly unavailable or encrypted with an unknown key. We present in this paper an attack on Short Message Service (SMS for short) authentication code which aims at gaining the control of IoT devices without firmware analysis. The key idea is based on the observation that IoT device usually has an official application (app for short) used to control itself. Customer needs to register an account before using this app, phone numbers are usually suggested to be the account name, and most
APA, Harvard, Vancouver, ISO, and other styles
17

Hu, Xueli, Fujun Lai, Gufan Chen, Rongcheng Zou, and Qingxiang Feng. "Quantitative Research on Global Terrorist Attacks and Terrorist Attack Classification." Sustainability 11, no. 5 (2019): 1487. http://dx.doi.org/10.3390/su11051487.

Full text
Abstract:
Terrorist attacks are events which hinder the development of a region. Before the terrorist attacks, we need to conduct a graded evaluation of the terrorist attacks. After getting the level of terrorist attacks, we can fight terrorist organizations more effectively. This paper builds rating models for terrorist attacks, hidden or emerging terrorist organization classification discovery models, terrorist organization alliance network models and more, through quantitative research of the Global Terrorism Database, which solved the event classification. Through studying relevant literature and th
APA, Harvard, Vancouver, ISO, and other styles
18

Skorobogatykh, K. V., and Yu E. Azimova. "Comparative evaluation of the efficiency of a sumatriptan/dexketoprofen combination versus sumatriptan monotherapy in the treatment of a migraine attack." Neurology, Neuropsychiatry, Psychosomatics 10, no. 3 (2018): 42–47. http://dx.doi.org/10.14412/2074-2711-2018-3-42-47.

Full text
Abstract:
Migraine is a chronic brain disease with a high prevalence and a marked deterioration in quality of life. Triptans are the gold standard for migraine attack therapy, but they are not effective in all patients. The aim of an observational program was to compare a sumatriptan/dexketoprofen combination and sumatriptan monotherapy for attack relief. Patients and methods. The observation program included 38 migraine patients. A migraine attack was relieved with a combination of sumatriptan 100 mg and dexketoprofen 25 mg in 20 patients and with only sumatriptan 100 mg in 18 patients (Group 2). All t
APA, Harvard, Vancouver, ISO, and other styles
19

Eicher, Peter. "Improving OSCE election observation." Security and Human Rights 20, no. 4 (2009): 264–76. http://dx.doi.org/10.1163/187502309789894857.

Full text
Abstract:
AbstractAlthough election observation has shown its value in enhancing public confidence and improving election practices, serious questions about the future of observation remain. Observer groups are under attack from some governments, while methods of manipulating elections have become increasingly sophisticated. A particular difficulty for observers is how to react when governments show a lack of political will to conduct fair elections. There are a number of steps that can be taken to meet these and other challenges, but ensuring that election observation remains relevant and effective wil
APA, Harvard, Vancouver, ISO, and other styles
20

Sun, D. M., Y. M. Jiang, Q. W. Xiang, et al. "Ex situ TEM observation of localized attack on AA 6061." Materials and Corrosion 61, no. 2 (2009): 105–10. http://dx.doi.org/10.1002/maco.200905267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Federici, Carlo, Francesca Perego, Ludovica Borsoi, et al. "Costs and effects of on-demand treatment of hereditary angioedema in Italy: a prospective cohort study of 167 patients." BMJ Open 8, no. 7 (2018): e022291. http://dx.doi.org/10.1136/bmjopen-2018-022291.

Full text
Abstract:
ObjectivesTo explore treatment behaviours in a cohort of Italian patients with hereditary angioedema due to complement C1-inhibitor deficiency (C1-INH-HAE), and to estimate how effects and costs of treating attacks in routine practice differed across available on-demand treatments.DesignCost analyses and survival analyses using attack-level data collected prospectively for 1 year.SettingNational reference centre for C1-INH-HAE.Participants167 patients with proved diagnosis of C1-INH-HAE, who reported data on angioedema attacks, including severity, localisation and duration, treatment received,
APA, Harvard, Vancouver, ISO, and other styles
22

Aaltonen, K., ML Hämäläinen, and K. Hoppu. "Migraine Attacks and Sleep in Children." Cephalalgia 20, no. 6 (2000): 580–84. http://dx.doi.org/10.1046/j.1468-2982.2000.00089.x.

Full text
Abstract:
Falling asleep as a means of ending migraine attack was studied in 133 4–16-year-old children in out-patient settings. Children registered 999 migraine attacks in headache diaries using a visual analogue scale (VAS) in 409 attacks and a five-face scale in 590 attacks. The distribution of maximal pain intensity was similar on both scales; on VAS 88% assigned grades between 63 and 100, and on the face scale 93% assigned grades of 4 or 5. Children fell asleep during 33% of the attacks ( n = 329), in 64% of these within the first hour ( n = 209). Of the children, 68% ( n = 91) had fallen asleep at
APA, Harvard, Vancouver, ISO, and other styles
23

Chamley, Christophe. "Dynamic Speculative Attacks." American Economic Review 93, no. 3 (2003): 603–21. http://dx.doi.org/10.1257/000282803322157007.

Full text
Abstract:
This paper presents a model of rational Bayesian agents with speculative attacks in a regime of exchange rate which is pegged within a band. Speculators learn from the observation of the exchange rate within the band whether their mass is sufficiently large for a successful attack. Multiple periods are necessary for the existence of speculative attacks. Various defense policies are analyzed. A trading policy by the central bank may defend the peg if it is unobserved and diminishes the market's information for the coordination of speculators.
APA, Harvard, Vancouver, ISO, and other styles
24

Arif, Astuti, Giselawati Putri, and Musrizal Muin. "Hazard Mapping of Subterranean Termite Attacks in Makassar City, South Sulawesi, Indonesia." Insects 11, no. 1 (2019): 31. http://dx.doi.org/10.3390/insects11010031.

Full text
Abstract:
Termites are distributed throughout the world and often cause economic losses. This study aims to; (1) analyze the relationship between the distribution of termite species and the environmental conditions of Makassar city; (2) determine the level of attack in the Makassar City; and (3) map the risk of termite attack in the Makassar City. Samples of Pinus merkusii (2 × 2 × 20 cm) were placed at 13 observation stations and covered using polyvinyl chloride (PVC) tubes (4″ in diameter, 25-cm in length). Samples remained in place for 6 months, at which point the presence of termite attacks as well
APA, Harvard, Vancouver, ISO, and other styles
25

Choliq, Fery Abdul, Mintarto Martosudiro, Qurrota Ayuni Apriliana, and Istiqomah Istiqomah. "Pengaruh Pemberian Urin Kelinci Terhadap Serangan Turnip Mosaic Virus (TuMV) Pada Tanaman Kailan (Brassica oleraceae var. alboglabra) yang Dibudidayakan Secara Organik." AGRORADIX : Jurnal Ilmu Pertanian 2, no. 2 (2019): 18–31. http://dx.doi.org/10.52166/agroteknologi.v2i2.1587.

Full text
Abstract:
Kai Lan has a high potential for being developed in Indonesia. The cultivation system that can produce high quality product that is organically cultivated of kai Lan. Organic plant cultivation require intensive maintenance. The disease that often attacks kailan plants is a mosaic disease caused by Turnip Mosaic Virus (TuMV). The purpose of this research was to find out the effect of giving rabbit urine against TuMV attack of kai Lan and to know the effect on growth and production of kai lan. Research conducted in the Organic Community Brenjonk Mojokerto regency, East Java. The research was con
APA, Harvard, Vancouver, ISO, and other styles
26

Wen-bin, Fu, Chen Xiu-hua, and Chen Quan-xin. "Clinical observation of eye acupuncture in treating acute attack of asthma." Journal of Acupuncture and Tuina Science 3, no. 3 (2005): 10–12. http://dx.doi.org/10.1007/bf02873741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Yokoi, Yoshifumi, and Hiromi Fukuta. "Flow Visualized Observation of a Symmetrical Airfoil with Attack Angle in Fluctuating Relative Flow Velocity." Applied Mechanics and Materials 390 (August 2013): 38–42. http://dx.doi.org/10.4028/www.scientific.net/amm.390.38.

Full text
Abstract:
In this study, a visualization experiment was performed in order to confirm the flow pattern around airfoil with relative velocity fluctuation by in-line forced oscillating in the direction of flow. An airfoil NACA0012 with attack angle of 5 degrees produce the separation in the steady state was observed by the experiments using dye streak method at Reynolds number Re=3.6x103. The investigation of the attack angle which does not separate in such low Reynolds number was performed, and it was confirmed that the separation occurs to 3 degrees. And the airfoil with attack angle of 2 degrees which
APA, Harvard, Vancouver, ISO, and other styles
28

Malviya, Taruna, and Khushboo Sawant. "Impact of Vampire Attack on Performance of Wireless Sensor Networks: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 96. http://dx.doi.org/10.23956/ijarcsse.v7i8.31.

Full text
Abstract:
A wireless sensor networks is a temporary, infrastructure less network where nodes communicate without any centralized mechanism. This dynamic behaviour of WSN makes this network more potentially applicable in conference, battlefield environment and disaster relief, and has received significant attention in recent years. Attacker may use this weakness to disrupt the network. Subsequently, Power draining is the major thread; where attacker not only exhausts the network traffic but also degrades the life of node as well network. The objective of this study is to detect and prevent wireless senso
APA, Harvard, Vancouver, ISO, and other styles
29

Fauzana, Hafiz, Agus Sutikno, and Destia Salbiah. "Population Fluctuations Oryctes rhinoceros L. Beetle in Plant Oil Palm (Elaeis guineensis Jacq.) Given Mulching Oil Palm Empty Bunch." CROPSAVER - Journal of Plant Protection 1, no. 1 (2019): 42. http://dx.doi.org/10.24198/cropsaver.v1i1.16998.

Full text
Abstract:
Oil palm is a pre-eminent commodity in Indonesia, especially in Riau Province. The main pests that attack the oil palm is the pest of beetle Oryctes rhinoceros. The life cycle of pre-adult O. rhinoceros is on the ground, while the one that attacks the plant is the beetle stadia. The application of oil palm empty bunches (OPEB) to oil palm cultivation that functions as mulch and soil compost can improve the physical and biological properties of the soil, otherwise O. rhinoceros actually increases its population with OPEB application. The objective of this research is to know the population of O
APA, Harvard, Vancouver, ISO, and other styles
30

Laidre, Kristin L., Mads Peter Heide-Jørgensen, and Jack R. Orr. "Reactions of Narwhals, Monodon monoceros, to Killer Whale, Orcinus orca, Attacks in the Eastern Canadian Arctic." Canadian Field-Naturalist 120, no. 4 (2006): 457. http://dx.doi.org/10.22621/cfn.v120i4.355.

Full text
Abstract:
A Killer Whale attack on Narwhals was observed at Kakiak Point in Admiralty Inlet, Nunavut, Canada, in August 2005. Behavioral responses of both Narwhals and Killer Whales were documented by direct observation. Data collected from Narwhals instrumented with satellite-linked transmitters 5 days prior to the arrival of Killer Whales were used to examine changes in Narwhal movement patterns (e.g., dispersal and clumping) five days before the attack, during the attack, and five days after Killer Whales left the area. A minimum of four Narwhals were killed by 12-15 Killer Whales in a period of 6 ho
APA, Harvard, Vancouver, ISO, and other styles
31

Widiyastuti, Dewi Amelia. "The Inventory of Weed in Rubber Plant (Hevea Brasiliensis) at Balai Pengawasan dan Sertifikasi Benih Perkebunan." Agrisains: Jurnal Budidaya Tanaman Perkebunan Politeknik Hasnur 6, no. 01 (2020): 29–36. http://dx.doi.org/10.46365/agrs.v6i01.372.

Full text
Abstract:
The purpose of this research is to know the botanical and morphology of any weeds that attack the rubber plant and weed control doneAt Balai Pengawasan And Sertifikasi Benih Perkebunan. The method used is descriptive method with data collection techniques through observation, interview and documentation. Based on the observation it can be seen that the weeds that attack the rubber plant in the Plantation Monitoring and Certification Seed in morphology are weeds, including the broad-leaved plant species and the puzzles such as jukut pahit (Axonopus compressus), Ara Sungsang (Asystasia ganggetic
APA, Harvard, Vancouver, ISO, and other styles
32

Hulme, Michael A., and Allan F. Dawson. "Serbian Spruce is as Vulnerable as Sitka Spruce to Damage by the Sitka Spruce Weevil." Western Journal of Applied Forestry 7, no. 1 (1992): 5–6. http://dx.doi.org/10.1093/wjaf/7.1.5.

Full text
Abstract:
Abstract Serbian spruce (Picea omorika) was first damaged naturally by the Sitka spruce weevil (Pissodes strobi) at about 15 years of age in an area on Vancouver Island where this weevil commonly attacks Sitka spruce (Picea sitchensis). By about 20 years of age, all 35 trees in the observation group had been damaged at least once. Serbian spruce cannot therefore be considered a suitable replacement for Sitka spruce in areas where attack by the Sitka spruce weevil is a forest management concern. West. J. Appl. For. 7(1):5-6.
APA, Harvard, Vancouver, ISO, and other styles
33

Berg, A. R., C. L. Heald, K. E. Huff Hartz, et al. "The impact of bark beetle infestation on monoterpene emissions and secondary organic aerosol formation in Western North America." Atmospheric Chemistry and Physics Discussions 12, no. 11 (2012): 29763–800. http://dx.doi.org/10.5194/acpd-12-29763-2012.

Full text
Abstract:
Abstract. Over the last decade, extensive beetle outbreaks in Western North America have destroyed over 100 000 km2 of forest throughout British Columbia and the Western United States. Beetle infestations impact monoterpene emissions through both decreased emissions as trees are killed (mortality effect) and increased emissions in trees under attack (attack effect). We use 14 yr of beetle mortality data together with beetle-induced monoterpene concentration data in the National Center for Atmospheric Research (NCAR) Community Earth System Model (CESM) to investigate the impact of beetle mortal
APA, Harvard, Vancouver, ISO, and other styles
34

Stiawan, Deris, Dimas Wahyudi, Ahmad Heryanto, et al. "TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis." International Journal of Online and Biomedical Engineering (iJOE) 15, no. 07 (2019): 124. http://dx.doi.org/10.3991/ijoe.v15i07.9848.

Full text
Abstract:
<p class="0abstract">Focus of this research is TCP FIN flood attack pattern recognition in Internet of Things (IoT) network using rule based signature analysis method. Dataset is taken based on three scenario normal, attack and normal-attack. The process of identification and recognition of TCP FIN flood attack pattern is done based on observation and analysis of packet attribute from raw data (pcap) using a feature extraction and feature selection method. Further testing was conducted using snort as an IDS. The results of the confusion matrix detection rate evaluation against the snort
APA, Harvard, Vancouver, ISO, and other styles
35

Mamunts, A. Kh, G. V. Batrakova, I. N. Trefilov, N. I. Ogorodova, and M. A. Mamunts. "Difficulties of life-time diagnosis of rabies. Clinical observation." Perm Medical Journal 35, no. 4 (2018): 88–93. http://dx.doi.org/10.17816/pmj35488-93.

Full text
Abstract:
The paper presents a case of rabies with lethal outcome in a fourteen-year-old adolescent. The child did not undergo postexposure prevention of rabies after a cat’s attack in connection with late addressing for medical care, just after occurrence of clinical symptoms of this disease. The child was not diagnosed “rabies” when was alive. Diagnosis was verified by detection of rabies virus RNA in autopsy material using polymerase chain reaction.
APA, Harvard, Vancouver, ISO, and other styles
36

Gable, Thomas D., and Daniel P. Gable. "Wolf (Canis sp.) attacks life-like deer decoy: insight into how wolves hunt deer?" Canadian Field-Naturalist 133, no. 1 (2019): 16–19. http://dx.doi.org/10.22621/cfn.v133i1.2044.

Full text
Abstract:
We know of no documented observations of wolves (Canis sp.) detecting and then attacking a White-tailed Deer (Odocoileus virginianus) during spring, summer, or fall. We describe an observation of a wolf attacking a life-like, two-dimensional deer decoy in November 2017 near Killarney Provincial Park, Ontario, Canada. The wolf appeared to locate the decoy by sight rather than sound or scent, suggesting that the profile of a deer is sufficient to trigger an attack by a wolf.
APA, Harvard, Vancouver, ISO, and other styles
37

Renner, Julian, Sven Puchinger, and Antonia Wachter-Zeh. "LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding." Designs, Codes and Cryptography 89, no. 6 (2021): 1279–319. http://dx.doi.org/10.1007/s10623-021-00861-z.

Full text
Abstract:
AbstractWe propose the new rank-metric code-based cryptosystem which is based on the hardness of list decoding and interleaved decoding of Gabidulin codes. is an improved variant of the Faure–Loidreau (FL) system, which was broken in a structural attack by Gaborit, Otmani, and Talé Kalachi (GOT, 2018). We keep the FL encryption and decryption algorithms, but modify the insecure key generation algorithm. Our crucial observation is that the GOT attack is equivalent to decoding an interleaved Gabidulin code. The new key generation algorithm constructs public keys for which all polynomial-time int
APA, Harvard, Vancouver, ISO, and other styles
38

Miller, Gabriel A., Judith K. Pell, and Stephen J. Simpson. "Crowded locusts produce hatchlings vulnerable to fungal attack." Biology Letters 5, no. 6 (2009): 845–48. http://dx.doi.org/10.1098/rsbl.2009.0495.

Full text
Abstract:
Transgenerational effects of parental experience on offspring immunity are well documented in the vertebrate literature (where antibodies play an obligatory role), but have only recently been described in invertebrates. We have assessed the impact of parental rearing density upon offspring disease resistance by challenging day-old locust hatchlings ( Schistocerca gregaria ) from either crowd- or solitary-reared parents with the fungal pathogen Metarhizium anisopliae var. acridum . When immersed in standardized conidia suspensions, hatchlings from gregarious parents suffered greater pathogen-in
APA, Harvard, Vancouver, ISO, and other styles
39

Harsan, Prihastuti, Arie Qurania, and Karina Damayanti. "Maize Plant Desease Identification (Zea Mays L. Saccharata) Using Image Processing and K-Nearest Neighbor (K-Nn)." International Journal of Engineering & Technology 7, no. 3.20 (2018): 402. http://dx.doi.org/10.14419/ijet.v7i3.20.20581.

Full text
Abstract:
Plant pests of maize are known to attack in all phases of corn plant growth (Zea mays L. saccharata), both vegetative and generative. Common pests found in maize are seed flies (Atherigona sp.), Stem borers (Ostrinia furnacalis), Boricoverpa armigera, leaf-eaters (Spodoptera litura). The process of identification of maize plant disease is done through laboratory analysis and direct observation. The time required to obtain the identification result is 4 (four) months. Plant pests will attack some parts of the plant, including leaves, stems and fruit. Early detection is usually done through leav
APA, Harvard, Vancouver, ISO, and other styles
40

Berg, A. R., C. L. Heald, K. E. Huff Hartz, et al. "The impact of bark beetle infestations on monoterpene emissions and secondary organic aerosol formation in western North America." Atmospheric Chemistry and Physics 13, no. 6 (2013): 3149–61. http://dx.doi.org/10.5194/acp-13-3149-2013.

Full text
Abstract:
Abstract. Over the last decade, extensive beetle outbreaks in western North America have destroyed over 100 000 km2 of forest throughout British Columbia and the western United States. Beetle infestations impact monoterpene emissions through both decreased emissions as trees are killed (mortality effect) and increased emissions in trees under attack (attack effect). We use 14 yr of beetle-induced tree mortality data together with beetle-induced monoterpene emission data in the National Center for Atmospheric Research (NCAR) Community Earth System Model (CESM) to investigate the impact of beetl
APA, Harvard, Vancouver, ISO, and other styles
41

Hur, Do Haeng, Myung Sik Choi, Deok Hyun Lee, and Jung Ho Han. "Considerations for metallographic observation of intergranular attack in Alloy 600 steam generator tubes." Nuclear Engineering and Technology 47, no. 7 (2015): 934–38. http://dx.doi.org/10.1016/j.net.2015.09.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kobayashi, Masahide, and Akira Ueda. "Observation of Mass Attack and Artificial Reproduction in Platypus quercivorus(Murayama)(Coleoptera: Platypodidae)." Japanese Journal of Applied Entomology and Zoology 47, no. 2 (2003): 53–60. http://dx.doi.org/10.1303/jjaez.2003.53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Lartillot, Olivier, Kristian Nymoen, Guilherme Schmidt Câmara, and Anne Danielsen. "Computational localization of attack regions through a direct observation of the audio waveform." Journal of the Acoustical Society of America 149, no. 1 (2021): 723–36. http://dx.doi.org/10.1121/10.0003374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Anandita, Aulia, Supriyadi Supriyadi, and Retno Wijayanti. "Pengaruh Waktu Pemasangan Kerodong pada Buah Pisang terhadap Serangan Hama Nacoleia Octasema." Agrosains: Jurnal Penelitian Agronomi 21, no. 2 (2019): 43. http://dx.doi.org/10.20961/agsjpa.v21i2.32474.

Full text
Abstract:
<p>Bagging banana fruits can be develop as a control to protect the fruits from Nacoleia octasema. The objective of this research was to determine the effect and relation of the banana fruit bagging time on N. octasema. This research was conducted in Tlogo Orchard, Delik Village, Tuntang District, Salatiga, Central Java from September-November 2018. This research used purposive sampling with 3 banana cultivars and 4 treatment. The observation variable of this research was the incidence of attacks. The results showed that there was an effect on the banana fruit bagging time against the in
APA, Harvard, Vancouver, ISO, and other styles
45

Suryaningsih, Ida Ayu Anggreni, and Ida Bagus Suryawan. "POSISI DESA SERANGAN BERDASARKAN ANALISIS TOURISM AREA LIFE CYCLE." JURNAL DESTINASI PARIWISATA 4, no. 2 (2016): 1. http://dx.doi.org/10.24843/despar.2016.v04.i02.p01.

Full text
Abstract:
Abstract In the development of a tourist area, especially the development of tourism will generally follow the pattern of grooves or tourism area life cycle is known as the Tourism Area Life Cycle (TALC). This paper aims to find a position that tourism in Serangan Village, so it can later be known by both programs suitable for the development of the area. The needs of the data used to meet, namely, observation, literature review and interviews with some of the residents and community leaders in the village attack. The collected data will be described later analyzed by descriptive. Observations
APA, Harvard, Vancouver, ISO, and other styles
46

Hardiansyah, Muhammad Yusril, Arif Fikri Al Ridho, and Nurhidayat. "The Effect of Garlic (Allium sativum) Extract Pesticides in Repelling Rice Eating Bird Pests." Indonesian Journal of Agricultural Research 3, no. 3 (2020): 145–52. http://dx.doi.org/10.32734/injar.v3i3.3947.

Full text
Abstract:
One of the main problems in rice cultivation is the difficulty of controlling bondol bird (Lonchura punctulata) pest attacks. Bird pest is one of the main enemies of farmers that can reduce crop production. Increasing bird populations cause crop yields to decline. So that one way that can be used in repelling bird pests is by giving pesticides from garlic extract. Allicin is a compound that gives garlic its distinctive smell which repels bird pests. This study aims to determine the effect of the provision of plant-based pesticides from garlic extract in repelling rice-eating bird pests. This r
APA, Harvard, Vancouver, ISO, and other styles
47

Liang, Junxi, Qiong Su, Shijie Zheng, Jing Yu, and Zhiyuan Geng. "Computational comparison of reactions of CS2 with CHX•- (X = F, Cl, and Br): Do F, Cl, and Br substitutions effect differently?" Journal of Theoretical and Computational Chemistry 14, no. 02 (2015): 1550009. http://dx.doi.org/10.1142/s0219633615500091.

Full text
Abstract:
Calculations based on density functional theory (DFT) have been carried out for the gas-phase ion-molecule reactions of CS 2 with CHX •- ( X = F , Cl , and Br ) to investigate the effect of the halogen-substituent on the reaction mechanism. The doublet potential energy surfaces (PESs), involving two striking reaction patterns named by the middle-C attack and the end-S attack in terms of anion attack on the C and S atoms of CS 2, have been explored and characterized in detail. Compared with the results of the end-S attack, reaction with the middle-C attack pattern displays more efficiency on PE
APA, Harvard, Vancouver, ISO, and other styles
48

Nuraeni, Yeni, Illa Anggraeni, and Rina Bogidarmanti. "IDENTIFIKASI RAYAP BENUANG BINI (Octomeles sumatrana Miq) DI KHDTK HAURBENTES." JURNAL HUTAN PULAU-PULAU KECIL 1, no. 2 (2016): 92. http://dx.doi.org/10.30598/jhppk.2016.1.2.92.

Full text
Abstract:
Benuang Bini Plant is one of alternative plant as raw material for the pulp industry. This species hasn’t been develoved extensively in the form forest plantation in Indonesia. Development activities in the form of pilot project has been developed by the Forestry Reseach and Development in KHDTK Haurbentes, West Java. In the benuang bini plant development, have various constraints such as pest and diseases attack. One of the pest that attack benuang bini plant in KHDTK Haurbentes is termite. The study was conducted in October 2014 in KHDTK Haurbentes, aims to identify the species of termites,
APA, Harvard, Vancouver, ISO, and other styles
49

Priyanti, Ratna Puji, Anja Hesnia Kholis, Asri Asri, Rifa'i Rifa'i, and Supriliyah Praningsih. "Family Experience in Dealing with Emergency Cardiovascular Disease." Jurnal Ners 14, no. 3 (2020): 205. http://dx.doi.org/10.20473/jn.v14i3.17020.

Full text
Abstract:
Discusiion: The risk of cardiovascular disease has shifted. Cardiovascular disease initially only affected certain age groups but not with the current incidence of cardiovascular disease. This makes the community more susceptible to cardiovascular disease attacks. An attack of cardiovascular disease, in general, is only considered to be a cursory attack. The patients with high-risk factors must be supported by the ability of families to recognize and perform first aid in cardiovascular disease attacks. The purpose of this study was to understand the family's experience in dealing with emergenc
APA, Harvard, Vancouver, ISO, and other styles
50

Jürgens, Tim P., Mads Barloese, Arne May, et al. "Long-term effectiveness of sphenopalatine ganglion stimulation for cluster headache." Cephalalgia 37, no. 5 (2016): 423–34. http://dx.doi.org/10.1177/0333102416649092.

Full text
Abstract:
Objectives The sphenopalatine ganglion (SPG) plays a pivotal role in cluster headache (CH) pathophysiology as the major efferent parasympathetic relay. We evaluated the long-term effectiveness of SPG stimulation in medically refractory, chronic CH patients. Methods Thirty-three patients were enrolled in an open-label follow-up study of the original Pathway CH-1 study, and participated through 24 months post-insertion of a microstimulator. Response to therapy was defined as acute effectiveness in ≥ 50% of attacks or a ≥ 50% reduction in attack frequency versus baseline. Results In total, 5956 a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!