Journal articles on the topic 'Hide model'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hide model.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
DEWELL, G. A., C. A. SIMPSON, R. D. DEWELL, D. R. HYATT, K. E. BELK, J. A. SCANGA, P. S. MORLEY, et al. "Risk Associated with Transportation and Lairage on Hide Contamination with Salmonella enterica in Finished Beef Cattle at Slaughter." Journal of Food Protection 71, no. 11 (November 1, 2008): 2228–32. http://dx.doi.org/10.4315/0362-028x-71.11.2228.
Full textNIBBI, A. "An Early Dynastic Hide-Covered Model Papyrus Boat." Revue d'Égyptologie 44 (January 1, 1993): 81–101. http://dx.doi.org/10.2143/re.44.0.2011258.
Full textMather, A. E., S. W. J. Reid, S. A. McEwen, H. E. Ternent, R. J. Reid-Smith, P. Boerlin, D. J. Taylor, W. B. Steele, G. J. Gunn, and D. J. Mellor. "Factors Associated with Cross-Contamination of Hides of Scottish Cattle by Escherichia coli O157." Applied and Environmental Microbiology 74, no. 20 (August 22, 2008): 6313–19. http://dx.doi.org/10.1128/aem.00770-08.
Full textKimmel, E., H. Arkin, D. Broday, and A. Berman. "A model of evaporative cooling in a wetted hide." Journal of Agricultural Engineering Research 49 (May 1991): 227–41. http://dx.doi.org/10.1016/0021-8634(91)80041-c.
Full textMoroz, Irene M. "The Hide, Skeldon, Acheson dynamo revisited." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 463, no. 2077 (August 8, 2006): 113–30. http://dx.doi.org/10.1098/rspa.2006.1758.
Full textFarida, Siti Ning, and Herlina Suksmawati. "Destination Branding of Shopping Tourism in Magetan Regency." Prosiding Semnasfi 1, no. 1 (May 9, 2018): 109. http://dx.doi.org/10.21070/semnasfi.v1i1.1143.
Full textDEWELL, G. A., C. A. SIMPSON, R. D. DEWELL, D. R. HYATT, K. E. BELK, J. A. SCANGA, P. S. MORLEY, et al. "Impact of Transportation and Lairage on Hide Contamination with Escherichia coli O157 in Finished Beef Cattle." Journal of Food Protection 71, no. 6 (June 1, 2008): 1114–18. http://dx.doi.org/10.4315/0362-028x-71.6.1114.
Full textMOROZ, IRENE M. "ON THE BEHAVIOR OF A SELF-EXCITING FARADAY DISK HOMOPOLAR DYNAMO WITH BATTERY IN THE PRESENCE OF AN EXTERNAL MAGNETIC FIELD." International Journal of Bifurcation and Chaos 11, no. 06 (June 2001): 1695–705. http://dx.doi.org/10.1142/s0218127401002948.
Full textChambaz, A., P. A. Dufey, M. Kreuzer, and J. Gresham. "Sources of variation influencing the use of real-time ultrasound to predict intramuscular fat in live beef cattle." Canadian Journal of Animal Science 82, no. 2 (June 1, 2002): 133–39. http://dx.doi.org/10.4141/a01-058.
Full textBOSILEVAC, JOSEPH M., STEVEN D. SHACKELFORD, DAYNA M. BRICHTA, and MOHAMMAD KOOHMARAIE. "Efficacy of Ozonated and Electrolyzed Oxidative Waters To Decontaminate Hides of Cattle before Slaughter†." Journal of Food Protection 68, no. 7 (July 1, 2005): 1393–98. http://dx.doi.org/10.4315/0362-028x-68.7.1393.
Full textRuiz-Zafra, Angel, Manuel Noguera, Kawtar Benghazi, and Sergio F. Ochoa. "A Model-Driven Approach for Wearable Systems Developments." International Journal of Distributed Sensor Networks 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/637130.
Full textFodor, Zoltán, Kieran Holland, Julius Kuti, Dániel Nógrádi, Chris Schroeder, and Chik Him Wong. "Can the nearly conformal sextet gauge model hide the Higgs impostor?" Physics Letters B 718, no. 2 (December 2012): 657–66. http://dx.doi.org/10.1016/j.physletb.2012.10.079.
Full textYang, Fan, Long Yang, and Ping Li. "The Dynamic Game of Knowledge Hiding Behavior from Organizational Members: To Hide or Not to Hide?" Complexity 2021 (September 6, 2021): 1–15. http://dx.doi.org/10.1155/2021/1713890.
Full textHalas, V., J. Dijkstra, L. Babinszky, M. W. A. Verstegen, and W. J. J. Gerrits. "Modelling of nutrient partitioning in growing pigs to predict their anatomical body composition. 1. Model description." British Journal of Nutrition 92, no. 4 (October 2004): 707–23. http://dx.doi.org/10.1079/bjn20041237.
Full textBursztyn, Leonardo, Georgy Egorov, and Robert Jensen. "Cool to be Smart or Smart to be Cool? Understanding Peer Pressure in Education." Review of Economic Studies 86, no. 4 (May 25, 2018): 1487–526. http://dx.doi.org/10.1093/restud/rdy026.
Full textGOLDBRUM, PAUL, IRENE M. MOROZ, and RAYMOND HIDE. "ON THE BIASING EFFECT OF A BATTERY ON A SELF-EXCITING FARADAY DISK HOMOPOLAR DYNAMO LOADED WITH A LINEAR SERIES MOTOR." International Journal of Bifurcation and Chaos 10, no. 08 (August 2000): 1875–85. http://dx.doi.org/10.1142/s0218127400001146.
Full textde Paor, A. M. "Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory." Nonlinear Processes in Geophysics 5, no. 2 (June 30, 1998): 75–80. http://dx.doi.org/10.5194/npg-5-75-1998.
Full textKim, Yeonjeong, and A. T. Panter. "Moral Character Judgments Using the Hidden Information Distribution and Evaluation (HIDE) Model." Academy of Management Proceedings 2017, no. 1 (August 2017): 17562. http://dx.doi.org/10.5465/ambpp.2017.283.
Full textEllerman, David. "The Arrow-Debreu model: How math can hide a fatal conceptual error." Forum for Social Economics 29, no. 2 (January 2000): 33–48. http://dx.doi.org/10.1007/bf02779102.
Full textGARNAEV, ANDREY, and ROBBERT FOKKINK. "A SEARCHER VERSUS HIDER GAME WITH INCOMPLETE INFORMATION ABOUT SEARCH RESOURCES." Asia-Pacific Journal of Operational Research 30, no. 02 (April 2013): 1250052. http://dx.doi.org/10.1142/s0217595912500522.
Full textShi, Yan, Gang Hu, Jia Fu Zhu, and Yong Chen. "The Method of Calculating Polluted Insulator's Flashover Voltage Based on ANN." Applied Mechanics and Materials 513-517 (February 2014): 4439–42. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.4439.
Full textGloag, Ros, Laurie-Anne Keller, and Naomi E. Langmore. "Cryptic cuckoo eggs hide from competing cuckoos." Proceedings of the Royal Society B: Biological Sciences 281, no. 1792 (October 7, 2014): 20141014. http://dx.doi.org/10.1098/rspb.2014.1014.
Full textAbdulmajeed, Nadia mohammed. "Domino, novel steganography system." ALUSTATH JOURNAL FOR HUMAN AND SOCIAL SCIENCES 219, no. 1 (November 8, 2018): 17–24. http://dx.doi.org/10.36473/ujhss.v219i1.497.
Full textSTEPHENS, T. P., T. A. MCALLISTER, and K. STANFORD. "Development of an Experimental Model To Assess the Ability of Escherichia coli O157:H7–Inoculated Fecal Pats To Mimic a Super Shedder within a Feedlot Environment." Journal of Food Protection 71, no. 3 (March 1, 2008): 648–52. http://dx.doi.org/10.4315/0362-028x-71.3.648.
Full textRoss, George. "Danger, One EU Crisis May Hide Another: Social Model Anxieties and Hard Cases." Comparative European Politics 4, no. 4 (November 23, 2006): 309–30. http://dx.doi.org/10.1057/palgrave.cep.6110088.
Full textKufenko, Vadim. "Hide-and-Seek with time-series filters: a model-based Monte Carlo study." Empirical Economics 59, no. 5 (July 22, 2019): 2335–61. http://dx.doi.org/10.1007/s00181-019-01736-y.
Full textMary, A. Geetha, D. P. Acharjya, and N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR." Cybernetics and Information Technologies 14, no. 1 (March 1, 2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.
Full textGal, Shmuel, Steve Alpern, and Jérôme Casas. "Prey should hide more randomly when a predator attacks more persistently." Journal of The Royal Society Interface 12, no. 113 (December 2015): 20150861. http://dx.doi.org/10.1098/rsif.2015.0861.
Full textSaha, Aniruddha, Akshayvarun Subramanya, and Hamed Pirsiavash. "Hidden Trigger Backdoor Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 11957–65. http://dx.doi.org/10.1609/aaai.v34i07.6871.
Full textWang, Fei, Yu Wang, and Yuan Tian. "Research of Parasitic Communication Model Based on Network Behavior Features." Applied Mechanics and Materials 519-520 (February 2014): 302–5. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.302.
Full textPuspitasari, Ana, Arif Wiyat Purnanto, and Hermahayu Hermahayu. "PENGARUH MODEL PEMBELAJARAN SAVI (SOMATIC, AUDITORY, VISUALIZATION, INTELLECTUAL) DENGAN MEDIA HIDE DAN SEEK PUZZLE TERHADAP HASIL BELAJAR IPA." Edukasi Journal 10, no. 2 (December 31, 2018): 137–48. http://dx.doi.org/10.31603/edukasi.v10i2.2545.
Full textDODD, CHARLES C., MICHAEL W. SANDERSON, MEGAN E. JACOB, and DAVID G. RENTER. "Modeling Preharvest and Harvest Interventions for Escherichia coli O157 Contamination of Beef Cattle Carcasses." Journal of Food Protection 74, no. 9 (September 1, 2011): 1422–33. http://dx.doi.org/10.4315/0362-028x.jfp-10-516.
Full textJahanfarnia, G., and S. Tashakor. "Mathematical model of impurities hide out and return in nuclear power plant steam generator." Progress in Nuclear Energy 51, no. 4-5 (May 2009): 644–48. http://dx.doi.org/10.1016/j.pnucene.2009.01.004.
Full textCrawford, Vincent P., and Nagore Iriberri. "Fatal Attraction: Salience, Naïveté, and Sophistication in Experimental “Hide-and-Seek” Games." American Economic Review 97, no. 5 (November 1, 2007): 1731–50. http://dx.doi.org/10.1257/aer.97.5.1731.
Full textArain, Ghulam Ali, Zeeshan Bhatti, Abdul Karim Khan, and Imran Hameed. "How and when do employees hide knowledge from co-workers? A multilevel moderated-mediation model." Academy of Management Proceedings 2021, no. 1 (August 2021): 13659. http://dx.doi.org/10.5465/ambpp.2021.13659abstract.
Full textZhu, Yong Song. "Study on Encryption and Decryption Algorithm and its Matlab Realization." Advanced Materials Research 282-283 (July 2011): 363–66. http://dx.doi.org/10.4028/www.scientific.net/amr.282-283.363.
Full textHaywood, R. D., A. C. Cameron, D. Queloz, S. C. C. Barros, M. Deleuil, R. Fares, M. Gillon, et al. "Planets and Stellar Activity: Hide and Seek in the CoRoT-7 system." Proceedings of the International Astronomical Union 8, S299 (June 2013): 237–40. http://dx.doi.org/10.1017/s1743921313008478.
Full textTamboli, Meera. "Image Steganography using 3 ways of Encryption for Highly Secured Data Transmission." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 4739–45. http://dx.doi.org/10.22214/ijraset.2021.35572.
Full textPourya, Asgarifard, Tafreshi Navid, and Sharifi Akbar. "A Novel Application of Refinery Merox Unit Wastewater for Bovine Hide Unhairing." Journal of the American Leather Chemists Association 115, no. 8 (August 3, 2020): 301–8. http://dx.doi.org/10.34314/jalca.v115i8.3844.
Full textVu, Dong Quan, Patrick Loiseau, Alonso Silva, and Long Tran-Thanh. "Path Planning Problems with Side Observations—When Colonels Play Hide-and-Seek." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 02 (April 3, 2020): 2252–59. http://dx.doi.org/10.1609/aaai.v34i02.5602.
Full textSunaga, Miho. "A SCHUMPETERIAN GROWTH MODEL WITH FINANCIAL INTERMEDIARIES." Macroeconomic Dynamics 23, no. 4 (March 27, 2018): 1679–702. http://dx.doi.org/10.1017/s1365100517000426.
Full textHiggi, Ali Hussain. "An Information Technology Based Instructional Model for Effective Learning." Learning and Teaching in Higher Education: Gulf Perspectives 4, no. 1 (June 1, 2007): 32–42. http://dx.doi.org/10.18538/lthe.v4.n1.06.
Full textKing, Geoffrey, and Geoff Bailey. "Tectonics and human evolution." Antiquity 80, no. 308 (June 1, 2006): 265–86. http://dx.doi.org/10.1017/s0003598x00093613.
Full textMuadzani, Alim, Oky Dwi Nurhayati, and Ike Pertiwi Windasari. "Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital." Jurnal Teknologi dan Sistem Komputer 4, no. 3 (August 14, 2016): 470. http://dx.doi.org/10.14710/jtsiskom.4.3.2016.470-478.
Full textRadcliffe, J. F., M. A. Garrett, T. W. B. Muxlow, R. J. Beswick, P. D. Barthel, A. T. Deller, A. Keimpema, R. M. Campbell, and N. Wrigley. "Nowhere to Hide: Radio-faint AGN in GOODS-N field." Astronomy & Astrophysics 619 (November 2018): A48. http://dx.doi.org/10.1051/0004-6361/201833399.
Full textMolina, Jonatan, Mateu Servera, and G. Leonard Burns. "Structure of ADHD/ODD Symptoms in Spanish Preschool Children: Dangers of Confirmatory Factor Analysis for Evaluation of Rating Scales." Assessment 27, no. 8 (April 2, 2019): 1748–57. http://dx.doi.org/10.1177/1073191119839140.
Full textLiu, Hanlin, Jingju Liu, Xuehu Yan, Lintao Liu, Wanmeng Ding, and Yue Jiang. "A Novel Behavior Steganography Model Based on Secret Sharing." International Journal of Digital Crime and Forensics 11, no. 4 (October 2019): 97–117. http://dx.doi.org/10.4018/ijdcf.2019100107.
Full textShahraeini, Sanaz, and Mahdi Yaghoobi. "A New Approach in Digital Image Watermarking Using Fractal Model in DWT Domain." Advanced Materials Research 403-408 (November 2011): 3510–18. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.3510.
Full textLu, Yong Qiang, Fang Yong, and He Xiang. "The Research on Hybrid Communication Model for Trojan Based on P2P." Advanced Materials Research 791-793 (September 2013): 2038–42. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.2038.
Full textChirumbolo, Salvatore. "Hormesis, resveratrol and plant-derived polyphenols: some comments." Human & Experimental Toxicology 30, no. 12 (May 9, 2011): 2027–30. http://dx.doi.org/10.1177/0960327111408153.
Full text