Journal articles on the topic 'Attack by observation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Attack by observation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Adus, Emilia Hatija, and Yustina Pu'u. "POPULASI DAN TINGKAT SERANGAN HAMA KUTU PUTIH Dysmicoccus brevipes (Hemiptera : Pseudociccidae) PADA TANAMAN JAHE (Zingiber officinalle Rosc) DI DESA NUAMURI KECAMATAN KELIMUTU." AGRICA 14, no. 1 (2021): 59–66. http://dx.doi.org/10.37478/agr.v14i1.1037.
Full textFernandes, Andrian, and Ngatiman . "PATTERNS OF Coptotermes sp. TERMITE ATTACK ON Shorea leprosula Miq IN KHDTK SEBULU, EAST KALIMANTAN." KnE Life Sciences 2, no. 1 (2015): 544. http://dx.doi.org/10.18502/kls.v2i1.213.
Full textKruszewski, Piotr, Carlos Bordini, Alf O. Brubakk, and Ottar Sjaastad. "Cluster Headache: Alterations in Heart Rate, Blood Pressure and Orthostatic Responses During Spontaneous Attacks." Cephalalgia 12, no. 3 (1992): 172–77. http://dx.doi.org/10.1046/j.1468-2982.1992.1203172.x.
Full textZulaikha, Eva, Arneti Arneti, and Munzir Busniah. "Menguji Tingkat Serangan Wereng Batang Coklat Nilaparvata lugens Stal (Hemiptera: Delphacidae) pada Varietas Padi Asal Pasaman di Rumah Kaca." JPT : JURNAL PROTEKSI TANAMAN (JOURNAL OF PLANT PROTECTION) 5, no. 1 (2021): 55. http://dx.doi.org/10.25077/jpt.5.1.55-59.2021.
Full textConti, Gustavo De Conti Teixeira Costa, Henrique De Oliveira Castro Castro, Auros Barreiros Freire Freire, et al. "High level of Brazilian men´s volleyball: characterization and difference of predictive factors of back row attack." Motricidade 14, no. 1 (2018): 58. http://dx.doi.org/10.6063/motricidade.12221.
Full textUtami, Sri, and Agus Ismanto. "SERANGAN HAMA DEFOLIATOR PADA BIBIT TANAMAN KEHUTANAN." JURNAL HUTAN PULAU-PULAU KECIL 1, no. 2 (2016): 97. http://dx.doi.org/10.30598/jhppk.2016.1.2.97.
Full textConti, Gustavo, Auro Freire, Breno Evangelista, Gustavo Pedrosa, Herbert Ugrinowitsch, and Henrique Castro. "Brazilian high-level men’s volleyball." Kinesiology 50, no. 2 (2018): 211–17. http://dx.doi.org/10.26582/k.50.2.4.
Full textHe, Gao Feng, Tao Zhang, Yuan Yuan Ma, and Jia Xuan Fei. "Protecting User’s Privacy from Browser-Based Attacks." Applied Mechanics and Materials 631-632 (September 2014): 941–45. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.941.
Full textCosta, Gustavo De Conti Teixeira, Breno Ferreira de Britto Evangelista, Mariana Pereira Maia, et al. "Voleibol: análise do ataque realizado a partir do fundo da quadra na Superliga Masculina Brasileira." Brazilian Journal of Kinanthropometry and Human Performance 19, no. 2 (2017): 233. http://dx.doi.org/10.5007/1980-0037.2017v19n2p233.
Full textLemos, Walkymário Paulo, José Cola Zanuncio, and José Eduardo Serrão. "Attack behavior of Podisus rostralis (Heteroptera: Pentatomidade) adults on caterpillars of Bombyx mori (Lepidoptera: Bombycidae)." Brazilian Archives of Biology and Technology 48, no. 6 (2005): 975–81. http://dx.doi.org/10.1590/s1516-89132005000800014.
Full textSubroto, Gatot, Dwi Erwin Kusbianto, Sholeh Avivi, Slameto Slameto, and Setiyono Setiyono. "Correlation Between Secondary Metabolites of Leaf and the Resistance to Leaf Rust (Hemileia vastatrix) on Several Arabica Coffee Clones." Ilmu Pertanian (Agricultural Science) 4, no. 2 (2019): 71. http://dx.doi.org/10.22146/ipas.42124.
Full textAlsuhibany, Suliman A. "A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack." Security and Communication Networks 2021 (January 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/6653076.
Full textYang, Zhichao, Rongmao Chen, Chao Li, Longjiang Qu, and Guomin Yang. "On the Security of LWE Cryptosystem against Subversion Attacks." Computer Journal 63, no. 4 (2019): 495–507. http://dx.doi.org/10.1093/comjnl/bxz084.
Full textSharma, Komal, and Anuradha Saini. "Critical Analysis of Numerous Attacks Irreverent Security in Remote Sensor Networks." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (2018): 68. http://dx.doi.org/10.23956/ijarcsse.v8i4.634.
Full textDhena, Emanuel Randy, and Yustina Maria Silvia Wonga Puu. "INVENTARISASI DAN IDENTIFIKASI HAMA DAN PENYAKIT UTAMA TANAMAN JAGUNG (Zea mays L.)." AGRICA 4, no. 2 (2020): 155–65. http://dx.doi.org/10.37478/agr.v4i2.461.
Full textWang, Dong, Xiaosong Zhang, Jiang Ming, Ting Chen, Chao Wang, and Weina Niu. "Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device." Wireless Communications and Mobile Computing 2018 (July 4, 2018): 1–15. http://dx.doi.org/10.1155/2018/7849065.
Full textHu, Xueli, Fujun Lai, Gufan Chen, Rongcheng Zou, and Qingxiang Feng. "Quantitative Research on Global Terrorist Attacks and Terrorist Attack Classification." Sustainability 11, no. 5 (2019): 1487. http://dx.doi.org/10.3390/su11051487.
Full textSkorobogatykh, K. V., and Yu E. Azimova. "Comparative evaluation of the efficiency of a sumatriptan/dexketoprofen combination versus sumatriptan monotherapy in the treatment of a migraine attack." Neurology, Neuropsychiatry, Psychosomatics 10, no. 3 (2018): 42–47. http://dx.doi.org/10.14412/2074-2711-2018-3-42-47.
Full textEicher, Peter. "Improving OSCE election observation." Security and Human Rights 20, no. 4 (2009): 264–76. http://dx.doi.org/10.1163/187502309789894857.
Full textSun, D. M., Y. M. Jiang, Q. W. Xiang, et al. "Ex situ TEM observation of localized attack on AA 6061." Materials and Corrosion 61, no. 2 (2009): 105–10. http://dx.doi.org/10.1002/maco.200905267.
Full textFederici, Carlo, Francesca Perego, Ludovica Borsoi, et al. "Costs and effects of on-demand treatment of hereditary angioedema in Italy: a prospective cohort study of 167 patients." BMJ Open 8, no. 7 (2018): e022291. http://dx.doi.org/10.1136/bmjopen-2018-022291.
Full textAaltonen, K., ML Hämäläinen, and K. Hoppu. "Migraine Attacks and Sleep in Children." Cephalalgia 20, no. 6 (2000): 580–84. http://dx.doi.org/10.1046/j.1468-2982.2000.00089.x.
Full textChamley, Christophe. "Dynamic Speculative Attacks." American Economic Review 93, no. 3 (2003): 603–21. http://dx.doi.org/10.1257/000282803322157007.
Full textArif, Astuti, Giselawati Putri, and Musrizal Muin. "Hazard Mapping of Subterranean Termite Attacks in Makassar City, South Sulawesi, Indonesia." Insects 11, no. 1 (2019): 31. http://dx.doi.org/10.3390/insects11010031.
Full textCholiq, Fery Abdul, Mintarto Martosudiro, Qurrota Ayuni Apriliana, and Istiqomah Istiqomah. "Pengaruh Pemberian Urin Kelinci Terhadap Serangan Turnip Mosaic Virus (TuMV) Pada Tanaman Kailan (Brassica oleraceae var. alboglabra) yang Dibudidayakan Secara Organik." AGRORADIX : Jurnal Ilmu Pertanian 2, no. 2 (2019): 18–31. http://dx.doi.org/10.52166/agroteknologi.v2i2.1587.
Full textWen-bin, Fu, Chen Xiu-hua, and Chen Quan-xin. "Clinical observation of eye acupuncture in treating acute attack of asthma." Journal of Acupuncture and Tuina Science 3, no. 3 (2005): 10–12. http://dx.doi.org/10.1007/bf02873741.
Full textYokoi, Yoshifumi, and Hiromi Fukuta. "Flow Visualized Observation of a Symmetrical Airfoil with Attack Angle in Fluctuating Relative Flow Velocity." Applied Mechanics and Materials 390 (August 2013): 38–42. http://dx.doi.org/10.4028/www.scientific.net/amm.390.38.
Full textMalviya, Taruna, and Khushboo Sawant. "Impact of Vampire Attack on Performance of Wireless Sensor Networks: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 96. http://dx.doi.org/10.23956/ijarcsse.v7i8.31.
Full textFauzana, Hafiz, Agus Sutikno, and Destia Salbiah. "Population Fluctuations Oryctes rhinoceros L. Beetle in Plant Oil Palm (Elaeis guineensis Jacq.) Given Mulching Oil Palm Empty Bunch." CROPSAVER - Journal of Plant Protection 1, no. 1 (2019): 42. http://dx.doi.org/10.24198/cropsaver.v1i1.16998.
Full textLaidre, Kristin L., Mads Peter Heide-Jørgensen, and Jack R. Orr. "Reactions of Narwhals, Monodon monoceros, to Killer Whale, Orcinus orca, Attacks in the Eastern Canadian Arctic." Canadian Field-Naturalist 120, no. 4 (2006): 457. http://dx.doi.org/10.22621/cfn.v120i4.355.
Full textWidiyastuti, Dewi Amelia. "The Inventory of Weed in Rubber Plant (Hevea Brasiliensis) at Balai Pengawasan dan Sertifikasi Benih Perkebunan." Agrisains: Jurnal Budidaya Tanaman Perkebunan Politeknik Hasnur 6, no. 01 (2020): 29–36. http://dx.doi.org/10.46365/agrs.v6i01.372.
Full textHulme, Michael A., and Allan F. Dawson. "Serbian Spruce is as Vulnerable as Sitka Spruce to Damage by the Sitka Spruce Weevil." Western Journal of Applied Forestry 7, no. 1 (1992): 5–6. http://dx.doi.org/10.1093/wjaf/7.1.5.
Full textBerg, A. R., C. L. Heald, K. E. Huff Hartz, et al. "The impact of bark beetle infestation on monoterpene emissions and secondary organic aerosol formation in Western North America." Atmospheric Chemistry and Physics Discussions 12, no. 11 (2012): 29763–800. http://dx.doi.org/10.5194/acpd-12-29763-2012.
Full textStiawan, Deris, Dimas Wahyudi, Ahmad Heryanto, et al. "TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis." International Journal of Online and Biomedical Engineering (iJOE) 15, no. 07 (2019): 124. http://dx.doi.org/10.3991/ijoe.v15i07.9848.
Full textMamunts, A. Kh, G. V. Batrakova, I. N. Trefilov, N. I. Ogorodova, and M. A. Mamunts. "Difficulties of life-time diagnosis of rabies. Clinical observation." Perm Medical Journal 35, no. 4 (2018): 88–93. http://dx.doi.org/10.17816/pmj35488-93.
Full textGable, Thomas D., and Daniel P. Gable. "Wolf (Canis sp.) attacks life-like deer decoy: insight into how wolves hunt deer?" Canadian Field-Naturalist 133, no. 1 (2019): 16–19. http://dx.doi.org/10.22621/cfn.v133i1.2044.
Full textRenner, Julian, Sven Puchinger, and Antonia Wachter-Zeh. "LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding." Designs, Codes and Cryptography 89, no. 6 (2021): 1279–319. http://dx.doi.org/10.1007/s10623-021-00861-z.
Full textMiller, Gabriel A., Judith K. Pell, and Stephen J. Simpson. "Crowded locusts produce hatchlings vulnerable to fungal attack." Biology Letters 5, no. 6 (2009): 845–48. http://dx.doi.org/10.1098/rsbl.2009.0495.
Full textHarsan, Prihastuti, Arie Qurania, and Karina Damayanti. "Maize Plant Desease Identification (Zea Mays L. Saccharata) Using Image Processing and K-Nearest Neighbor (K-Nn)." International Journal of Engineering & Technology 7, no. 3.20 (2018): 402. http://dx.doi.org/10.14419/ijet.v7i3.20.20581.
Full textBerg, A. R., C. L. Heald, K. E. Huff Hartz, et al. "The impact of bark beetle infestations on monoterpene emissions and secondary organic aerosol formation in western North America." Atmospheric Chemistry and Physics 13, no. 6 (2013): 3149–61. http://dx.doi.org/10.5194/acp-13-3149-2013.
Full textHur, Do Haeng, Myung Sik Choi, Deok Hyun Lee, and Jung Ho Han. "Considerations for metallographic observation of intergranular attack in Alloy 600 steam generator tubes." Nuclear Engineering and Technology 47, no. 7 (2015): 934–38. http://dx.doi.org/10.1016/j.net.2015.09.003.
Full textKobayashi, Masahide, and Akira Ueda. "Observation of Mass Attack and Artificial Reproduction in Platypus quercivorus(Murayama)(Coleoptera: Platypodidae)." Japanese Journal of Applied Entomology and Zoology 47, no. 2 (2003): 53–60. http://dx.doi.org/10.1303/jjaez.2003.53.
Full textLartillot, Olivier, Kristian Nymoen, Guilherme Schmidt Câmara, and Anne Danielsen. "Computational localization of attack regions through a direct observation of the audio waveform." Journal of the Acoustical Society of America 149, no. 1 (2021): 723–36. http://dx.doi.org/10.1121/10.0003374.
Full textAnandita, Aulia, Supriyadi Supriyadi, and Retno Wijayanti. "Pengaruh Waktu Pemasangan Kerodong pada Buah Pisang terhadap Serangan Hama Nacoleia Octasema." Agrosains: Jurnal Penelitian Agronomi 21, no. 2 (2019): 43. http://dx.doi.org/10.20961/agsjpa.v21i2.32474.
Full textSuryaningsih, Ida Ayu Anggreni, and Ida Bagus Suryawan. "POSISI DESA SERANGAN BERDASARKAN ANALISIS TOURISM AREA LIFE CYCLE." JURNAL DESTINASI PARIWISATA 4, no. 2 (2016): 1. http://dx.doi.org/10.24843/despar.2016.v04.i02.p01.
Full textHardiansyah, Muhammad Yusril, Arif Fikri Al Ridho, and Nurhidayat. "The Effect of Garlic (Allium sativum) Extract Pesticides in Repelling Rice Eating Bird Pests." Indonesian Journal of Agricultural Research 3, no. 3 (2020): 145–52. http://dx.doi.org/10.32734/injar.v3i3.3947.
Full textLiang, Junxi, Qiong Su, Shijie Zheng, Jing Yu, and Zhiyuan Geng. "Computational comparison of reactions of CS2 with CHX•- (X = F, Cl, and Br): Do F, Cl, and Br substitutions effect differently?" Journal of Theoretical and Computational Chemistry 14, no. 02 (2015): 1550009. http://dx.doi.org/10.1142/s0219633615500091.
Full textNuraeni, Yeni, Illa Anggraeni, and Rina Bogidarmanti. "IDENTIFIKASI RAYAP BENUANG BINI (Octomeles sumatrana Miq) DI KHDTK HAURBENTES." JURNAL HUTAN PULAU-PULAU KECIL 1, no. 2 (2016): 92. http://dx.doi.org/10.30598/jhppk.2016.1.2.92.
Full textPriyanti, Ratna Puji, Anja Hesnia Kholis, Asri Asri, Rifa'i Rifa'i, and Supriliyah Praningsih. "Family Experience in Dealing with Emergency Cardiovascular Disease." Jurnal Ners 14, no. 3 (2020): 205. http://dx.doi.org/10.20473/jn.v14i3.17020.
Full textJürgens, Tim P., Mads Barloese, Arne May, et al. "Long-term effectiveness of sphenopalatine ganglion stimulation for cluster headache." Cephalalgia 37, no. 5 (2016): 423–34. http://dx.doi.org/10.1177/0333102416649092.
Full text