Artículos de revistas sobre el tema "Hide model"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Hide model".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
DEWELL, G. A., C. A. SIMPSON, R. D. DEWELL, et al. "Risk Associated with Transportation and Lairage on Hide Contamination with Salmonella enterica in Finished Beef Cattle at Slaughter." Journal of Food Protection 71, no. 11 (2008): 2228–32. http://dx.doi.org/10.4315/0362-028x-71.11.2228.
Texto completoNIBBI, A. "An Early Dynastic Hide-Covered Model Papyrus Boat." Revue d'Égyptologie 44 (January 1, 1993): 81–101. http://dx.doi.org/10.2143/re.44.0.2011258.
Texto completoMather, A. E., S. W. J. Reid, S. A. McEwen, et al. "Factors Associated with Cross-Contamination of Hides of Scottish Cattle by Escherichia coli O157." Applied and Environmental Microbiology 74, no. 20 (2008): 6313–19. http://dx.doi.org/10.1128/aem.00770-08.
Texto completoKimmel, E., H. Arkin, D. Broday, and A. Berman. "A model of evaporative cooling in a wetted hide." Journal of Agricultural Engineering Research 49 (May 1991): 227–41. http://dx.doi.org/10.1016/0021-8634(91)80041-c.
Texto completoMoroz, Irene M. "The Hide, Skeldon, Acheson dynamo revisited." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 463, no. 2077 (2006): 113–30. http://dx.doi.org/10.1098/rspa.2006.1758.
Texto completoFarida, Siti Ning, and Herlina Suksmawati. "Destination Branding of Shopping Tourism in Magetan Regency." Prosiding Semnasfi 1, no. 1 (2018): 109. http://dx.doi.org/10.21070/semnasfi.v1i1.1143.
Texto completoDEWELL, G. A., C. A. SIMPSON, R. D. DEWELL, et al. "Impact of Transportation and Lairage on Hide Contamination with Escherichia coli O157 in Finished Beef Cattle." Journal of Food Protection 71, no. 6 (2008): 1114–18. http://dx.doi.org/10.4315/0362-028x-71.6.1114.
Texto completoMOROZ, IRENE M. "ON THE BEHAVIOR OF A SELF-EXCITING FARADAY DISK HOMOPOLAR DYNAMO WITH BATTERY IN THE PRESENCE OF AN EXTERNAL MAGNETIC FIELD." International Journal of Bifurcation and Chaos 11, no. 06 (2001): 1695–705. http://dx.doi.org/10.1142/s0218127401002948.
Texto completoChambaz, A., P. A. Dufey, M. Kreuzer, and J. Gresham. "Sources of variation influencing the use of real-time ultrasound to predict intramuscular fat in live beef cattle." Canadian Journal of Animal Science 82, no. 2 (2002): 133–39. http://dx.doi.org/10.4141/a01-058.
Texto completoBOSILEVAC, JOSEPH M., STEVEN D. SHACKELFORD, DAYNA M. BRICHTA, and MOHAMMAD KOOHMARAIE. "Efficacy of Ozonated and Electrolyzed Oxidative Waters To Decontaminate Hides of Cattle before Slaughter†." Journal of Food Protection 68, no. 7 (2005): 1393–98. http://dx.doi.org/10.4315/0362-028x-68.7.1393.
Texto completoRuiz-Zafra, Angel, Manuel Noguera, Kawtar Benghazi, and Sergio F. Ochoa. "A Model-Driven Approach for Wearable Systems Developments." International Journal of Distributed Sensor Networks 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/637130.
Texto completoFodor, Zoltán, Kieran Holland, Julius Kuti, Dániel Nógrádi, Chris Schroeder, and Chik Him Wong. "Can the nearly conformal sextet gauge model hide the Higgs impostor?" Physics Letters B 718, no. 2 (2012): 657–66. http://dx.doi.org/10.1016/j.physletb.2012.10.079.
Texto completoYang, Fan, Long Yang, and Ping Li. "The Dynamic Game of Knowledge Hiding Behavior from Organizational Members: To Hide or Not to Hide?" Complexity 2021 (September 6, 2021): 1–15. http://dx.doi.org/10.1155/2021/1713890.
Texto completoHalas, V., J. Dijkstra, L. Babinszky, M. W. A. Verstegen, and W. J. J. Gerrits. "Modelling of nutrient partitioning in growing pigs to predict their anatomical body composition. 1. Model description." British Journal of Nutrition 92, no. 4 (2004): 707–23. http://dx.doi.org/10.1079/bjn20041237.
Texto completoBursztyn, Leonardo, Georgy Egorov, and Robert Jensen. "Cool to be Smart or Smart to be Cool? Understanding Peer Pressure in Education." Review of Economic Studies 86, no. 4 (2018): 1487–526. http://dx.doi.org/10.1093/restud/rdy026.
Texto completoGOLDBRUM, PAUL, IRENE M. MOROZ, and RAYMOND HIDE. "ON THE BIASING EFFECT OF A BATTERY ON A SELF-EXCITING FARADAY DISK HOMOPOLAR DYNAMO LOADED WITH A LINEAR SERIES MOTOR." International Journal of Bifurcation and Chaos 10, no. 08 (2000): 1875–85. http://dx.doi.org/10.1142/s0218127400001146.
Texto completode Paor, A. M. "Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory." Nonlinear Processes in Geophysics 5, no. 2 (1998): 75–80. http://dx.doi.org/10.5194/npg-5-75-1998.
Texto completoKim, Yeonjeong, and A. T. Panter. "Moral Character Judgments Using the Hidden Information Distribution and Evaluation (HIDE) Model." Academy of Management Proceedings 2017, no. 1 (2017): 17562. http://dx.doi.org/10.5465/ambpp.2017.283.
Texto completoEllerman, David. "The Arrow-Debreu model: How math can hide a fatal conceptual error." Forum for Social Economics 29, no. 2 (2000): 33–48. http://dx.doi.org/10.1007/bf02779102.
Texto completoGARNAEV, ANDREY, and ROBBERT FOKKINK. "A SEARCHER VERSUS HIDER GAME WITH INCOMPLETE INFORMATION ABOUT SEARCH RESOURCES." Asia-Pacific Journal of Operational Research 30, no. 02 (2013): 1250052. http://dx.doi.org/10.1142/s0217595912500522.
Texto completoShi, Yan, Gang Hu, Jia Fu Zhu, and Yong Chen. "The Method of Calculating Polluted Insulator's Flashover Voltage Based on ANN." Applied Mechanics and Materials 513-517 (February 2014): 4439–42. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.4439.
Texto completoGloag, Ros, Laurie-Anne Keller, and Naomi E. Langmore. "Cryptic cuckoo eggs hide from competing cuckoos." Proceedings of the Royal Society B: Biological Sciences 281, no. 1792 (2014): 20141014. http://dx.doi.org/10.1098/rspb.2014.1014.
Texto completoAbdulmajeed, Nadia mohammed. "Domino, novel steganography system." ALUSTATH JOURNAL FOR HUMAN AND SOCIAL SCIENCES 219, no. 1 (2018): 17–24. http://dx.doi.org/10.36473/ujhss.v219i1.497.
Texto completoSTEPHENS, T. P., T. A. MCALLISTER, and K. STANFORD. "Development of an Experimental Model To Assess the Ability of Escherichia coli O157:H7–Inoculated Fecal Pats To Mimic a Super Shedder within a Feedlot Environment." Journal of Food Protection 71, no. 3 (2008): 648–52. http://dx.doi.org/10.4315/0362-028x-71.3.648.
Texto completoRoss, George. "Danger, One EU Crisis May Hide Another: Social Model Anxieties and Hard Cases." Comparative European Politics 4, no. 4 (2006): 309–30. http://dx.doi.org/10.1057/palgrave.cep.6110088.
Texto completoKufenko, Vadim. "Hide-and-Seek with time-series filters: a model-based Monte Carlo study." Empirical Economics 59, no. 5 (2019): 2335–61. http://dx.doi.org/10.1007/s00181-019-01736-y.
Texto completoMary, A. Geetha, D. P. Acharjya, and N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR." Cybernetics and Information Technologies 14, no. 1 (2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.
Texto completoGal, Shmuel, Steve Alpern, and Jérôme Casas. "Prey should hide more randomly when a predator attacks more persistently." Journal of The Royal Society Interface 12, no. 113 (2015): 20150861. http://dx.doi.org/10.1098/rsif.2015.0861.
Texto completoSaha, Aniruddha, Akshayvarun Subramanya, and Hamed Pirsiavash. "Hidden Trigger Backdoor Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (2020): 11957–65. http://dx.doi.org/10.1609/aaai.v34i07.6871.
Texto completoWang, Fei, Yu Wang, and Yuan Tian. "Research of Parasitic Communication Model Based on Network Behavior Features." Applied Mechanics and Materials 519-520 (February 2014): 302–5. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.302.
Texto completoPuspitasari, Ana, Arif Wiyat Purnanto, and Hermahayu Hermahayu. "PENGARUH MODEL PEMBELAJARAN SAVI (SOMATIC, AUDITORY, VISUALIZATION, INTELLECTUAL) DENGAN MEDIA HIDE DAN SEEK PUZZLE TERHADAP HASIL BELAJAR IPA." Edukasi Journal 10, no. 2 (2018): 137–48. http://dx.doi.org/10.31603/edukasi.v10i2.2545.
Texto completoDODD, CHARLES C., MICHAEL W. SANDERSON, MEGAN E. JACOB, and DAVID G. RENTER. "Modeling Preharvest and Harvest Interventions for Escherichia coli O157 Contamination of Beef Cattle Carcasses." Journal of Food Protection 74, no. 9 (2011): 1422–33. http://dx.doi.org/10.4315/0362-028x.jfp-10-516.
Texto completoJahanfarnia, G., and S. Tashakor. "Mathematical model of impurities hide out and return in nuclear power plant steam generator." Progress in Nuclear Energy 51, no. 4-5 (2009): 644–48. http://dx.doi.org/10.1016/j.pnucene.2009.01.004.
Texto completoCrawford, Vincent P., and Nagore Iriberri. "Fatal Attraction: Salience, Naïveté, and Sophistication in Experimental “Hide-and-Seek” Games." American Economic Review 97, no. 5 (2007): 1731–50. http://dx.doi.org/10.1257/aer.97.5.1731.
Texto completoArain, Ghulam Ali, Zeeshan Bhatti, Abdul Karim Khan, and Imran Hameed. "How and when do employees hide knowledge from co-workers? A multilevel moderated-mediation model." Academy of Management Proceedings 2021, no. 1 (2021): 13659. http://dx.doi.org/10.5465/ambpp.2021.13659abstract.
Texto completoZhu, Yong Song. "Study on Encryption and Decryption Algorithm and its Matlab Realization." Advanced Materials Research 282-283 (July 2011): 363–66. http://dx.doi.org/10.4028/www.scientific.net/amr.282-283.363.
Texto completoHaywood, R. D., A. C. Cameron, D. Queloz, et al. "Planets and Stellar Activity: Hide and Seek in the CoRoT-7 system." Proceedings of the International Astronomical Union 8, S299 (2013): 237–40. http://dx.doi.org/10.1017/s1743921313008478.
Texto completoTamboli, Meera. "Image Steganography using 3 ways of Encryption for Highly Secured Data Transmission." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 4739–45. http://dx.doi.org/10.22214/ijraset.2021.35572.
Texto completoPourya, Asgarifard, Tafreshi Navid, and Sharifi Akbar. "A Novel Application of Refinery Merox Unit Wastewater for Bovine Hide Unhairing." Journal of the American Leather Chemists Association 115, no. 8 (2020): 301–8. http://dx.doi.org/10.34314/jalca.v115i8.3844.
Texto completoVu, Dong Quan, Patrick Loiseau, Alonso Silva, and Long Tran-Thanh. "Path Planning Problems with Side Observations—When Colonels Play Hide-and-Seek." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 02 (2020): 2252–59. http://dx.doi.org/10.1609/aaai.v34i02.5602.
Texto completoSunaga, Miho. "A SCHUMPETERIAN GROWTH MODEL WITH FINANCIAL INTERMEDIARIES." Macroeconomic Dynamics 23, no. 4 (2018): 1679–702. http://dx.doi.org/10.1017/s1365100517000426.
Texto completoHiggi, Ali Hussain. "An Information Technology Based Instructional Model for Effective Learning." Learning and Teaching in Higher Education: Gulf Perspectives 4, no. 1 (2007): 32–42. http://dx.doi.org/10.18538/lthe.v4.n1.06.
Texto completoKing, Geoffrey, and Geoff Bailey. "Tectonics and human evolution." Antiquity 80, no. 308 (2006): 265–86. http://dx.doi.org/10.1017/s0003598x00093613.
Texto completoMuadzani, Alim, Oky Dwi Nurhayati, and Ike Pertiwi Windasari. "Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital." Jurnal Teknologi dan Sistem Komputer 4, no. 3 (2016): 470. http://dx.doi.org/10.14710/jtsiskom.4.3.2016.470-478.
Texto completoRadcliffe, J. F., M. A. Garrett, T. W. B. Muxlow, et al. "Nowhere to Hide: Radio-faint AGN in GOODS-N field." Astronomy & Astrophysics 619 (November 2018): A48. http://dx.doi.org/10.1051/0004-6361/201833399.
Texto completoMolina, Jonatan, Mateu Servera, and G. Leonard Burns. "Structure of ADHD/ODD Symptoms in Spanish Preschool Children: Dangers of Confirmatory Factor Analysis for Evaluation of Rating Scales." Assessment 27, no. 8 (2019): 1748–57. http://dx.doi.org/10.1177/1073191119839140.
Texto completoLiu, Hanlin, Jingju Liu, Xuehu Yan, Lintao Liu, Wanmeng Ding, and Yue Jiang. "A Novel Behavior Steganography Model Based on Secret Sharing." International Journal of Digital Crime and Forensics 11, no. 4 (2019): 97–117. http://dx.doi.org/10.4018/ijdcf.2019100107.
Texto completoShahraeini, Sanaz, and Mahdi Yaghoobi. "A New Approach in Digital Image Watermarking Using Fractal Model in DWT Domain." Advanced Materials Research 403-408 (November 2011): 3510–18. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.3510.
Texto completoLu, Yong Qiang, Fang Yong, and He Xiang. "The Research on Hybrid Communication Model for Trojan Based on P2P." Advanced Materials Research 791-793 (September 2013): 2038–42. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.2038.
Texto completoChirumbolo, Salvatore. "Hormesis, resveratrol and plant-derived polyphenols: some comments." Human & Experimental Toxicology 30, no. 12 (2011): 2027–30. http://dx.doi.org/10.1177/0960327111408153.
Texto completo