Littérature scientifique sur le sujet « Host data »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Host data ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Host data"

1

Corcoran, Frank, Hiroshii Irii, and John R. Rosenberger. "Host laboratory and data interchanges." Speech Communication 12, no. 2 (1993): 171–81. http://dx.doi.org/10.1016/s0167-6393(05)80009-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kadam, S. S., and P.B. Kumbharkar. "Data Derivation Investigation." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 06 (2014): 854–59. https://doi.org/10.5281/zenodo.14742628.

Texte intégral
Résumé :
Malicious software is a major issue in today’s computer world. Such software can silently reside in user’s computer and can easily interact with computing resources. It is necessary to improve the honesty of host and its system data. For improvement in security and honesty of host, this work is introduced. This mechanism ensures the correct origin or provenance of critical system information and prevents utilization of host resources by malware. Using this mechanism the source where a piece of data is generated can be identified. A cryptographic origin approach ensures system prope
Styles APA, Harvard, Vancouver, ISO, etc.
3

Pereira, Marco. "Testing the Correlation Between Host Galaxy Mass and Redshift Using the Pantheon Survey Data." Engineering and Applied Sciences Journal 2, no. 2 (2025): 01–03. https://doi.org/10.64030/3067-8005.02.02.01.

Texte intégral
Résumé :
This study investigates the relationship between redshift and host galaxy mass using the Pantheon Supernova Survey dataset. The hypothesis that galaxies with identical luminous distances should have the same host mass is tested using statistical correlation analysis. Contrary to expectations from contraction-based cosmological models, our findings indicate. • No statistically significant correlation between redshift and host galaxy mass. • A very strong correlation (r = 0.979) between redshift and photometric distance derived from Type IA Supernovae. • The complete absence of evidence supporti
Styles APA, Harvard, Vancouver, ISO, etc.
4

Koval, O., S. Voloshynovskiy, J. E. Vila-Forcén, F. Pérez-González, F. Deguillaume, and T. Pun. "Robustness improvement of known-host-state data-hiding using host statistics." Signal Processing 86, no. 5 (2006): 1076–88. http://dx.doi.org/10.1016/j.sigpro.2005.07.024.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Rao, N. Maheswara, and S. Venkata Ramana. "Superlative Server for Host-To-Host Based Massive Calibration Data Processing Platform." International Journal of Computer Trends and Technology 26, no. 1 (2015): 26–31. http://dx.doi.org/10.14445/22312803/ijctt-v26p105.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Thomas, F. "Parasites as host evolutionary prints: insights into host evolution from parasitological data." International Journal for Parasitology 26, no. 10 (1996): 1137. http://dx.doi.org/10.1016/s0020-7519(97)81289-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

AmanYadav, Srivastav Abhishek, Tiwari Abhinandan, and Vir Singh Krishna. "Host-based Intrusion Detection System (HIDS)." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 1043–49. https://doi.org/10.35940/ijeat.E9903.069520.

Texte intégral
Résumé :
This paper presents the data analysis and feature extraction of KDD dataset of 1999. This is used to detect signature based and anomaly attacks on a system. The process is supported by data extraction as well as data cleaning of the above mentioned data set. The dataset consists of 42 parameters and 58 services. These parameters are further filtered to extract useful attributes. Every attack in the dataset is labeled either with “normal” or into four different attack types i.e. denial-of-service, network probe, remote-to-local or user-to-root. Using different machine learning algor
Styles APA, Harvard, Vancouver, ISO, etc.
8

Sotillo, Javier, Rafael Toledo, Jason Mulvenna, and Alex Loukas. "Exploiting Helminth–Host Interactomes through Big Data." Trends in Parasitology 33, no. 11 (2017): 875–88. http://dx.doi.org/10.1016/j.pt.2017.06.011.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Yan, Weikai, and Duane E. Falk. "Biplot Analysis of Host-by-Pathogen Data." Plant Disease 86, no. 12 (2002): 1396–401. http://dx.doi.org/10.1094/pdis.2002.86.12.1396.

Texte intégral
Résumé :
Effective breeding for disease resistance relies on a thorough understanding of host-by-pathogen relations. Achieving such understanding can be difficult and challenging, particularly for large data sets with complex host genotype-by-pathogen strain interactions. This paper presents a biplot approach that facilitates visual analysis of host-by-pathogen data. A biplot displays both host genotypes and pathogen isolates in a single scatter plot; each genotype or isolate is displayed as a point defined by its scores on the first two principal components derived from subjecting genotype- or strain-
Styles APA, Harvard, Vancouver, ISO, etc.
10

Pan, Yicheng, Yang Zhang, Tingzhu Bi, et al. "HEAL: Performance Troubleshooting Deep inside Data Center Hosts." ACM SIGMETRICS Performance Evaluation Review 52, no. 1 (2024): 41–42. http://dx.doi.org/10.1145/3673660.3655058.

Texte intégral
Résumé :
This study demonstrates the salient facts and challenges of host failure operations in hyperscale data centers. A host incident can involve hundreds of distinct host-level metrics. The faulting mechanism inside the host connects these heterogeneous metrics through direct and indirect correlation, making it extremely difficult to sort out the propagation procedures and the root cause from these intertwined indicators. To deeply understand the failure mechanism inside the host, we develop HEAL -- a novel host metrics analysis toolkit. HEAL discovers dynamic causality in sparse heterogeneous host
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "Host data"

1

Sharma, Anil. "Development of a host vulnerability checking tool and data analysis of host vulnerabilities." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/1878.

Texte intégral
Résumé :
Thesis (M.S.) -- University of Maryland, College Park, 2004.<br>Thesis research directed by: Dept. of Mechanical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Buendia, Patricia. "Phylogenetic analysis of within-host serially-sampled viral data." FIU Digital Commons, 2006. http://digitalcommons.fiu.edu/etd/2019.

Texte intégral
Résumé :
The primary goal of this dissertation is the study of patterns of viral evolution inferred from serially-sampled sequence data, i.e., sequence data obtained from strains isolated at consecutive time points from a single patient or host. RNA viral populations have an extremely high genetic variability, largely due to their astronomical population sizes within host systems, high replication rate, and short generation time. It is this aspect of their evolution that demands special attention and a different approach when studying the evolutionary relationships of serially-sampled sequence data. Ne
Styles APA, Harvard, Vancouver, ISO, etc.
3

Barnard, Michael T. "Data Transfer System for Host Computer and FPGA Communication." University of Dayton / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1448287709.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Phelan, J. "A bioinformatic analysis of Mycobacterium tuberculosis and host genomic data." Thesis, London School of Hygiene and Tropical Medicine (University of London), 2018. http://researchonline.lshtm.ac.uk/4646310/.

Texte intégral
Résumé :
Human tuberculosis disease (TB) is caused by bacteria within the Mycobacterium tuberculosis complex, including M. tuberculosis (Mtb). Genetic variation within the pathogen can lead to drug resistance, affect virulence and transmissibility. I have analysed Mtb whole genome sequence data to improve the understanding of global genetic variation, and the resulting insights could ultimately assist the development of TB control measures. Whole genome sequencing platforms are being used to infer drug resistance profiles, and thereby could assist clinical management. I investigated the reproducibility
Styles APA, Harvard, Vancouver, ISO, etc.
5

Salomonsson, Sebastian. "Exploring NAT Host Counting Using Network Traffic Flows." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-55261.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Deng, Yipan. "DeviceGuard: External Device-Assisted System And Data Security." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/76767.

Texte intégral
Résumé :
This thesis addresses the threat that personal computer faced from malware when the personal computer is connected to the Internet. Traditional host-based security approaches, such as anti-virus scanning protect the host from virus, worms, Trojans and other malwares. One of the issues of the host-based security approaches is that when the operating system is compromised by the malware, the antivirus software also becomes vulnerable. In this thesis, we present a novel approach through using an external device to enhance the host security by offloading the security solution from the host to
Styles APA, Harvard, Vancouver, ISO, etc.
7

Boleme, Mpati. "Development and testing of the RHINO host streamed data acquisition framework." Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24865.

Texte intégral
Résumé :
This project focuses on developing a supporting framework for integrating the Reconfigurable Hardware INterface for computing and radiO (RHINO) with a Personal Computer (PC) host in order to facilitate the development of Software Defined Radio (SDR) applications built using a hybrid RHINO/multicore PC system. The supporting framework that is the focus of this dissertation is designed around two main parts: a) resources for integrating the GNU Radio framework with the RHINO platform to allow data streams to be sent from RHINO to be processed by GNU Radio, and b) a concise and highly efficient C
Styles APA, Harvard, Vancouver, ISO, etc.
8

Turner, Joanne. "Temporal and spatial host-pathogen models with diverse types of transmission." Thesis, University of Liverpool, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.343605.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Jin, Hao. "Host and Network Optimizations for Performance Enhancement and Energy Efficiency in Data Center Networks." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/735.

Texte intégral
Résumé :
Modern data centers host hundreds of thousands of servers to achieve economies of scale. Such a huge number of servers create challenges for the data center network (DCN) to provide proportionally large bandwidth. In addition, the deployment of virtual machines (VMs) in data centers raises the requirements for efficient resource allocation and find-grained resource sharing. Further, the large number of servers and switches in the data center consume significant amounts of energy. Even though servers become more energy efficient with various energy saving techniques, DCN still accounts for 20%
Styles APA, Harvard, Vancouver, ISO, etc.
10

Sturgill, David Matthew. "Comparative Genome Analysis of Three Brucella spp. and a Data Model for Automated Multiple Genome Comparison." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/10163.

Texte intégral
Résumé :
Comparative analysis of multiple genomes presents many challenges ranging from management of information about thousands of local similarities to definition of features by combination of evidence from multiple analyses and experiments. This research represents the development stage of a database-backed pipeline for comparative analysis of multiple genomes. The genomes of three recently sequenced species of Brucella were compared and a superset of known and hypothetical coding sequences was identified to be used in design of a discriminatory genomic cDNA array for comparative functional genomic
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Livres sur le sujet "Host data"

1

Kanakia, Hemant Ratubhai. High-performance host interfacing for packet-switched networks. Dept. of Computer Science, Stanford University, 1991.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Klein, Catherine Jelena. Haftung von Social-Sharing-Plattformen: Diensteanbieter zwischen Content- und Host-Providing. C.H. Beck, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

International, Strategic Directions. European LIMS end-user survey: A host of new challenges and exciting opportunities. 2nd ed. SDI, 1998.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

McKay, C. A study of system interface sets (SIS) for the host, target and integration environments of the space station program (SSP). Research Institute for Computing and Information Systems, University of Houston-Clear Lake, 1987.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

United States. Dept. of Education. National Student Loan Data Systems., ed. How to access host site listings for October 19 videoconference "SSCR: the new wave process. U.S. Dept. of Education, NSLDS Division, 1995.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

National Genealogical Society. Conference in the States. National Genealogical Society Conference in the States and Gentech 2006 : $b Chicago, they passed this way : 7-10 June 2006 : program syllabus : local host Chicagoland Genealogical Consortium. National Genealogical Society, 2006.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Bradbury, Michael H. Far-field sorption data bases for performance assessment of a L/ILW repository in an undisturbed Palfris marl host rock. Paul Scherrer Institut, 1997.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Bradbury, Michael H. Far-field sorption data bases for performance assessment of a L/ILW repository in a disturbed/altered Palfris marl host rock. Paul Scherrer Institut, 1997.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Ben-Dov, Yair. A systematic catalogue of the soft scale insects of the world (Homoptera:Coccoidea:Coccidae): With data on geographical distribution, host plants, biology, and economics importance. Sandhill Crane Press, 1993.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

IEEE SP Workshop on Statistical Signal and Array Processing (6th 1992 University of Victoria, B.C., and Naval Surface Warfare Center, Detachment Puget Sound). IEEE Sixth SP Workshop on Statistical Signal and Array Processing: Conference proceedings : host institutions, University of Victoria, Victoria, British Columbia [and] Naval Surface Warfare Center, Carderock Division, Detachment Puget Sound, Oct. 7-9, 1992. Institute of Electrical and Electronic Engineers, 1992.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Chapitres de livres sur le sujet "Host data"

1

Weik, Martin H. "host data type." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8478.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Helbig, Carolin, Uwe-Jens Görke, Mathias Nest, et al. "Data Management." In GeomInt–Mechanical Integrity of Host Rocks. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-61909-1_5.

Texte intégral
Résumé :
AbstractData management includes the development and use of architectures, guidelines, practices and procedures for accurate managing of data during the entire data lifecycle of an institutional unit or a research project. Data are defined as different information units such as numbers, alphabetic characters, and symbols that are particularly formatted and can be processed by computer. The data in the project is provided by various actors which can be GeomInt partners, their legal representatives, employees, and external partners.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Reinders, James, Ben Ashbaugh, James Brodman, Michael Kinsner, John Pennycook, and Xinmin Tian. "Where Code Executes." In Data Parallel C++. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5574-2_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Buchanan, W. J. "IPCONFIG Command and Host." In The Handbook of Data Communications and Networks. Springer US, 2004. http://dx.doi.org/10.1007/978-1-4020-7870-5_78.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Deshpande, Prachi S., Subhash C. Sharma, and Sateesh K. Peddoju. "A Host-Based Intrusion Detection System." In Studies in Big Data. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6089-3_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Fones, Helen N., and George R. Littlejohn. "From Sample to Data: Preparing, Obtaining, and Analyzing Images of Plant-Pathogen Interactions Using Confocal Microscopy." In Host-Pathogen Interactions. Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4939-7604-1_20.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Reinders, James, Ben Ashbaugh, James Brodman, Michael Kinsner, John Pennycook, and Xinmin Tian. "Where Code Executes." In Data Parallel C++. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9691-2_2.

Texte intégral
Résumé :
AbstractC++ with SYCL provides a framework for heterogeneous programming in which code can execute on a combination of a host CPU and one or more devices. Chapter 2 describes the mechanisms that determine where code can execute and when.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Valerio, Federica, Victoria G. Twort, and Anne Duplouy. "Screening Host Genomic Data for Wolbachia Infections." In Methods in Molecular Biology. Springer US, 2023. http://dx.doi.org/10.1007/978-1-0716-3553-7_16.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Morrison, Clyde Arthur. "Theory and Data." In Crystal Fields for Transition-Metal Ions in Laser Host Materials. Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/978-3-642-95686-7_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Reinders, James, Ben Ashbaugh, James Brodman, Michael Kinsner, John Pennycook, and Xinmin Tian. "Libraries." In Data Parallel C++. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9691-2_18.

Texte intégral
Résumé :
AbstractChapter 18 covers libraries – specifically SYCL built-in functions, using C++ standard library functions in kernels, and C++ parallel algorithms. Understanding which libraries can be used safely in device code and how host-side libraries can be configured to leverage SYCL is crucial to being a productive SYCL programmer.
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Host data"

1

Nam, Yujin, Rachel King, Quinn Burke, Minxuan Zhou, Patrick McDaniel, and Tajana Rosing. "Efficient Host Intrusion Detection using Hyperdimensional Computing." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10825247.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Benti, Donayam, and Todd Austin. "DOME: Automated Validation of Data-Oblivious Program Execution." In 2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2025. https://doi.org/10.1109/host64725.2025.11050012.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Krüger, Paul, Stefan Wildermann, and Jürgen Teich. "Breaking Confidentiality of XTS-AES Encrypted Data at Rest on Microprocessors Using Electromagnetic Side-Channel Attacks." In 2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2025. https://doi.org/10.1109/host64725.2025.11050075.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Chen, Jing, Zhe Yu, Lin Han, and Fang Chen. "Design of Data Encryption and Decryption IP Core Based on SATA Host Transport Layer." In 2024 3rd International Symposium on Semiconductor and Electronic Technology (ISSET). IEEE, 2024. https://doi.org/10.1109/isset62871.2024.10779960.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Shi, Qingyu, Huang Huang, Xiaocui Li, Chuang Li, Wenzhi Cao, and Limei Liu. "Adaptive Network Load Balancing at the End Host for Traffic Bursts in Data Centers." In 2024 IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, 2024. https://doi.org/10.1109/hpcc64274.2024.00063.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Patrick, Matthew, Richard O. J. H. Stutt, and Christopher A. Gilligan. "Rasterising Epidemiological Host Data Efficiently." In 2014 UKSim-AMSS 16th International Conference on Modelling and Simulation (UKSim). IEEE, 2014. http://dx.doi.org/10.1109/uksim.2014.42.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Vila-Forcen, J. E., O. Koval, S. Voloshynovskiy, and T. Pun. "Asymmetric spread spectrum data-hiding for Laplacian host data." In 2005 International Conference on Image Processing. IEEE, 2005. http://dx.doi.org/10.1109/icip.2005.1529726.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Nugraha, Dwi Ria, Achmad Nizar Hidayanto, and Teguh Raharjo. "Evaluation Host-to-Host Data Integration Implementation Project Case Study: PT Jasa Raharja." In 2022 International Conference on ICT for Smart Society (ICISS). IEEE, 2022. http://dx.doi.org/10.1109/iciss55894.2022.9915134.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Cho, Benjamin Y., Yongkee Kwon, Sangkug Lym, and Mattan Erez. "Near Data Acceleration with Concurrent Host Access." In 2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA). IEEE, 2020. http://dx.doi.org/10.1109/isca45697.2020.00072.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Shahinfar, Farbod, Sebastiano Miano, Giuseppe Siracusano, Roberto Bifulco, Aurojit Panda, and Gianni Antichi. "Disaggregate Applications Along End-Host Data-Path." In CoNEXT 2023: The 19th International Conference on emerging Networking EXperiments and Technologies. ACM, 2023. http://dx.doi.org/10.1145/3630202.3630230.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Host data"

1

Acquesta, Erin, Guenevere Chen, Susan S. Adams, et al. Detailed Statistical Models of Host-Based Data for Detection of Malicious Activity. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1570095.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Armstrong, Dave. Interactive Data Visualization and Dashboards with R. Instats Inc., 2023. http://dx.doi.org/10.61700/5yfe9tbcy56el469.

Texte intégral
Résumé :
This seminar introduces interactive graphs that can be made easily in R and shows how to incorporate those interactive elements into a dashboard that you can use to powerfully communicate your research results. Topics include an overview of ggplots, turning ggplots into interactive visualizations, making interactive network graphs and maps, and combining interactive elements into dashboards. Finally, we discuss how to host these dashboards so others can interact with them. An official Instats certificate of completion is provided at the conclusion of the seminar. The seminar offers 2 ECTS Equi
Styles APA, Harvard, Vancouver, ISO, etc.
3

Armstrong, Dave. Interactive Data Visualization and Dashboards with R. Instats Inc., 2023. http://dx.doi.org/10.61700/j9oufi3b7b0cv469.

Texte intégral
Résumé :
This seminar introduces interactive graphs that can be made easily in R and shows how to incorporate those interactive elements into a dashboard that you can use to powerfully communicate your research results. Topics include an overview of ggplots, turning ggplots into interactive visualizations, making interactive network graphs and maps, and combining interactive elements into dashboards. Finally, we discuss how to host these dashboards so others can interact with them. An official Instats certificate of completion is provided at the conclusion of the seminar. The seminar offers 2 ECTS Equi
Styles APA, Harvard, Vancouver, ISO, etc.
4

Van Rythoven, A., K. Scarberry, and S. Risedorf. Preliminary data release of whole-rock assays from rare earth and niobium deposits in Ravalli County, Montana. Montana Bureau of Mines and Geology, 2024. http://dx.doi.org/10.59691/vlkd7955.

Texte intégral
Résumé :
This file provides location, description, and assay data on 11 samples of carbonatite and host rocks from the Sheep Creek area of southern Ravalli County in Montana. Samples were collected in July 2023.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Matthew, Gray. Data from "Winter is Coming – Temperature Affects Immune Defenses and Susceptibility to Batrachochytrium salamandrivorans". University of Tennessee, Knoxville Libraries, 2021. http://dx.doi.org/10.7290/t7sallfxxe.

Texte intégral
Résumé :
Environmental temperature is a key factor driving various biological processes, including immune defenses and host-pathogen interactions. Here, we evaluated the effects of environmental temperature on the pathogenicity of the emerging fungus, Batrachochytrium salamandrivorans (Bsal), using controlled laboratory experiments, and measured components of host immune defense to identify regulating mechanisms. We found that adult and juvenile Notophthalmus viridescens died faster due to Bsal chytridiomycosis at 14 ºC than at 6 and 22 ºC. Pathogen replication rates, total available proteins on the sk
Styles APA, Harvard, Vancouver, ISO, etc.
6

Radford, Kate, and Rudolph Ampofo. Working Towards Education Success Using Data: A review of Ghana's journey towards improved learning outcomes using data. EdTech Hub, 2024. http://dx.doi.org/10.53832/edtechhub.1059.

Texte intégral
Résumé :
The sub-Saharan Africa region is trapped in a learning crisis with devastating implications for children. The Covid-19 pandemic further exacerbated the situation, with children losing an estimated equivalent of an additional year’s learning. Not addressing the regional learning crisis will have a detrimental impact on economic development and well-being and risks restricting future national and regional economic growth and productivity and fuelling social unrest. Education research has shown that good quality education system data, when judiciously used, can support improved learning outcomes
Styles APA, Harvard, Vancouver, ISO, etc.
7

Citovsky, Vitaly, and Yedidya Gafni. Nuclear Import of the Tomato Yellow Curl Leaf Virus in Tomato Plants. United States Department of Agriculture, 1994. http://dx.doi.org/10.32747/1994.7568765.bard.

Texte intégral
Résumé :
Tomato yellow leaf curl geminivirus (TYLCV) is a major pathogen of cultivated tomato, causing up to 100% crop loss in many parts of the world. In Israel the disease is well known and has an economic significance. In recent years viral symptoms were found in countries of the "New World" and since 1997, in Florida. Surprisingly, little is known about the molecular mechanisms of TYLCV interaction with the host plant cells. This proposal was aimed at expanding our understanding of the molecular mechanisms by which TYLCV enters the host cell nucleus. The main objective was to elucidate the TYLCV pr
Styles APA, Harvard, Vancouver, ISO, etc.
8

Chejanovsky, Nor, and Suzanne M. Thiem. Isolation of Baculoviruses with Expanded Spectrum of Action against Lepidopteran Pests. United States Department of Agriculture, 2002. http://dx.doi.org/10.32747/2002.7586457.bard.

Texte intégral
Résumé :
Our long-term goal is to learn to control (expand and restrict) the host range of baculoviruses. In this project our aim was to expand the host range of the prototype baculovirus Autographa cali/arnica nuclear polyhedrosis virus (AcMNPV) towards American and Israeli pests. To achieve this objective we studied AcMNPV infection in the non-permissive hosts L. dispar and s. littoralis (Ld652Y and SL2 cells, respectively) as a model system and the major barriers to viral replication. We isolated recombinant baculoviruses with expanded infectivity towards L. dispar and S. littoralis and tested their
Styles APA, Harvard, Vancouver, ISO, etc.
9

Jones, D., and R. Woundy. The DOCSIS (Data-Over-Cable Service Interface Specifications) Device Class DHCP (Dynamic Host Configuration Protocol) Relay Agent Information Sub-option. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3256.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Gray, Matthew, and Davis Carter. Data for Broad host susceptibility of North American amphibian species to Batrachochytrium salamandrivorans suggests high invasion potential and extinction risk. University of Tennessee, Knoxville Libraries, 2021. http://dx.doi.org/10.7290/pj8iwh7due.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!