Artículos de revistas sobre el tema "Hide model"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Hide model".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
DEWELL, G. A., C. A. SIMPSON, R. D. DEWELL, D. R. HYATT, K. E. BELK, J. A. SCANGA, P. S. MORLEY et al. "Risk Associated with Transportation and Lairage on Hide Contamination with Salmonella enterica in Finished Beef Cattle at Slaughter". Journal of Food Protection 71, n.º 11 (1 de noviembre de 2008): 2228–32. http://dx.doi.org/10.4315/0362-028x-71.11.2228.
Texto completoNIBBI, A. "An Early Dynastic Hide-Covered Model Papyrus Boat". Revue d'Égyptologie 44 (1 de enero de 1993): 81–101. http://dx.doi.org/10.2143/re.44.0.2011258.
Texto completoMather, A. E., S. W. J. Reid, S. A. McEwen, H. E. Ternent, R. J. Reid-Smith, P. Boerlin, D. J. Taylor, W. B. Steele, G. J. Gunn y D. J. Mellor. "Factors Associated with Cross-Contamination of Hides of Scottish Cattle by Escherichia coli O157". Applied and Environmental Microbiology 74, n.º 20 (22 de agosto de 2008): 6313–19. http://dx.doi.org/10.1128/aem.00770-08.
Texto completoKimmel, E., H. Arkin, D. Broday y A. Berman. "A model of evaporative cooling in a wetted hide". Journal of Agricultural Engineering Research 49 (mayo de 1991): 227–41. http://dx.doi.org/10.1016/0021-8634(91)80041-c.
Texto completoMoroz, Irene M. "The Hide, Skeldon, Acheson dynamo revisited". Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 463, n.º 2077 (8 de agosto de 2006): 113–30. http://dx.doi.org/10.1098/rspa.2006.1758.
Texto completoFarida, Siti Ning y Herlina Suksmawati. "Destination Branding of Shopping Tourism in Magetan Regency". Prosiding Semnasfi 1, n.º 1 (9 de mayo de 2018): 109. http://dx.doi.org/10.21070/semnasfi.v1i1.1143.
Texto completoDEWELL, G. A., C. A. SIMPSON, R. D. DEWELL, D. R. HYATT, K. E. BELK, J. A. SCANGA, P. S. MORLEY et al. "Impact of Transportation and Lairage on Hide Contamination with Escherichia coli O157 in Finished Beef Cattle". Journal of Food Protection 71, n.º 6 (1 de junio de 2008): 1114–18. http://dx.doi.org/10.4315/0362-028x-71.6.1114.
Texto completoMOROZ, IRENE M. "ON THE BEHAVIOR OF A SELF-EXCITING FARADAY DISK HOMOPOLAR DYNAMO WITH BATTERY IN THE PRESENCE OF AN EXTERNAL MAGNETIC FIELD". International Journal of Bifurcation and Chaos 11, n.º 06 (junio de 2001): 1695–705. http://dx.doi.org/10.1142/s0218127401002948.
Texto completoChambaz, A., P. A. Dufey, M. Kreuzer y J. Gresham. "Sources of variation influencing the use of real-time ultrasound to predict intramuscular fat in live beef cattle". Canadian Journal of Animal Science 82, n.º 2 (1 de junio de 2002): 133–39. http://dx.doi.org/10.4141/a01-058.
Texto completoBOSILEVAC, JOSEPH M., STEVEN D. SHACKELFORD, DAYNA M. BRICHTA y MOHAMMAD KOOHMARAIE. "Efficacy of Ozonated and Electrolyzed Oxidative Waters To Decontaminate Hides of Cattle before Slaughter†". Journal of Food Protection 68, n.º 7 (1 de julio de 2005): 1393–98. http://dx.doi.org/10.4315/0362-028x-68.7.1393.
Texto completoRuiz-Zafra, Angel, Manuel Noguera, Kawtar Benghazi y Sergio F. Ochoa. "A Model-Driven Approach for Wearable Systems Developments". International Journal of Distributed Sensor Networks 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/637130.
Texto completoFodor, Zoltán, Kieran Holland, Julius Kuti, Dániel Nógrádi, Chris Schroeder y Chik Him Wong. "Can the nearly conformal sextet gauge model hide the Higgs impostor?" Physics Letters B 718, n.º 2 (diciembre de 2012): 657–66. http://dx.doi.org/10.1016/j.physletb.2012.10.079.
Texto completoYang, Fan, Long Yang y Ping Li. "The Dynamic Game of Knowledge Hiding Behavior from Organizational Members: To Hide or Not to Hide?" Complexity 2021 (6 de septiembre de 2021): 1–15. http://dx.doi.org/10.1155/2021/1713890.
Texto completoHalas, V., J. Dijkstra, L. Babinszky, M. W. A. Verstegen y W. J. J. Gerrits. "Modelling of nutrient partitioning in growing pigs to predict their anatomical body composition. 1. Model description". British Journal of Nutrition 92, n.º 4 (octubre de 2004): 707–23. http://dx.doi.org/10.1079/bjn20041237.
Texto completoBursztyn, Leonardo, Georgy Egorov y Robert Jensen. "Cool to be Smart or Smart to be Cool? Understanding Peer Pressure in Education". Review of Economic Studies 86, n.º 4 (25 de mayo de 2018): 1487–526. http://dx.doi.org/10.1093/restud/rdy026.
Texto completoGOLDBRUM, PAUL, IRENE M. MOROZ y RAYMOND HIDE. "ON THE BIASING EFFECT OF A BATTERY ON A SELF-EXCITING FARADAY DISK HOMOPOLAR DYNAMO LOADED WITH A LINEAR SERIES MOTOR". International Journal of Bifurcation and Chaos 10, n.º 08 (agosto de 2000): 1875–85. http://dx.doi.org/10.1142/s0218127400001146.
Texto completode Paor, A. M. "Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory". Nonlinear Processes in Geophysics 5, n.º 2 (30 de junio de 1998): 75–80. http://dx.doi.org/10.5194/npg-5-75-1998.
Texto completoKim, Yeonjeong y A. T. Panter. "Moral Character Judgments Using the Hidden Information Distribution and Evaluation (HIDE) Model". Academy of Management Proceedings 2017, n.º 1 (agosto de 2017): 17562. http://dx.doi.org/10.5465/ambpp.2017.283.
Texto completoEllerman, David. "The Arrow-Debreu model: How math can hide a fatal conceptual error". Forum for Social Economics 29, n.º 2 (enero de 2000): 33–48. http://dx.doi.org/10.1007/bf02779102.
Texto completoGARNAEV, ANDREY y ROBBERT FOKKINK. "A SEARCHER VERSUS HIDER GAME WITH INCOMPLETE INFORMATION ABOUT SEARCH RESOURCES". Asia-Pacific Journal of Operational Research 30, n.º 02 (abril de 2013): 1250052. http://dx.doi.org/10.1142/s0217595912500522.
Texto completoShi, Yan, Gang Hu, Jia Fu Zhu y Yong Chen. "The Method of Calculating Polluted Insulator's Flashover Voltage Based on ANN". Applied Mechanics and Materials 513-517 (febrero de 2014): 4439–42. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.4439.
Texto completoGloag, Ros, Laurie-Anne Keller y Naomi E. Langmore. "Cryptic cuckoo eggs hide from competing cuckoos". Proceedings of the Royal Society B: Biological Sciences 281, n.º 1792 (7 de octubre de 2014): 20141014. http://dx.doi.org/10.1098/rspb.2014.1014.
Texto completoAbdulmajeed, Nadia mohammed. "Domino, novel steganography system". ALUSTATH JOURNAL FOR HUMAN AND SOCIAL SCIENCES 219, n.º 1 (8 de noviembre de 2018): 17–24. http://dx.doi.org/10.36473/ujhss.v219i1.497.
Texto completoSTEPHENS, T. P., T. A. MCALLISTER y K. STANFORD. "Development of an Experimental Model To Assess the Ability of Escherichia coli O157:H7–Inoculated Fecal Pats To Mimic a Super Shedder within a Feedlot Environment". Journal of Food Protection 71, n.º 3 (1 de marzo de 2008): 648–52. http://dx.doi.org/10.4315/0362-028x-71.3.648.
Texto completoRoss, George. "Danger, One EU Crisis May Hide Another: Social Model Anxieties and Hard Cases". Comparative European Politics 4, n.º 4 (23 de noviembre de 2006): 309–30. http://dx.doi.org/10.1057/palgrave.cep.6110088.
Texto completoKufenko, Vadim. "Hide-and-Seek with time-series filters: a model-based Monte Carlo study". Empirical Economics 59, n.º 5 (22 de julio de 2019): 2335–61. http://dx.doi.org/10.1007/s00181-019-01736-y.
Texto completoMary, A. Geetha, D. P. Acharjya y N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR". Cybernetics and Information Technologies 14, n.º 1 (1 de marzo de 2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.
Texto completoGal, Shmuel, Steve Alpern y Jérôme Casas. "Prey should hide more randomly when a predator attacks more persistently". Journal of The Royal Society Interface 12, n.º 113 (diciembre de 2015): 20150861. http://dx.doi.org/10.1098/rsif.2015.0861.
Texto completoSaha, Aniruddha, Akshayvarun Subramanya y Hamed Pirsiavash. "Hidden Trigger Backdoor Attacks". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 07 (3 de abril de 2020): 11957–65. http://dx.doi.org/10.1609/aaai.v34i07.6871.
Texto completoWang, Fei, Yu Wang y Yuan Tian. "Research of Parasitic Communication Model Based on Network Behavior Features". Applied Mechanics and Materials 519-520 (febrero de 2014): 302–5. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.302.
Texto completoPuspitasari, Ana, Arif Wiyat Purnanto y Hermahayu Hermahayu. "PENGARUH MODEL PEMBELAJARAN SAVI (SOMATIC, AUDITORY, VISUALIZATION, INTELLECTUAL) DENGAN MEDIA HIDE DAN SEEK PUZZLE TERHADAP HASIL BELAJAR IPA". Edukasi Journal 10, n.º 2 (31 de diciembre de 2018): 137–48. http://dx.doi.org/10.31603/edukasi.v10i2.2545.
Texto completoDODD, CHARLES C., MICHAEL W. SANDERSON, MEGAN E. JACOB y DAVID G. RENTER. "Modeling Preharvest and Harvest Interventions for Escherichia coli O157 Contamination of Beef Cattle Carcasses". Journal of Food Protection 74, n.º 9 (1 de septiembre de 2011): 1422–33. http://dx.doi.org/10.4315/0362-028x.jfp-10-516.
Texto completoJahanfarnia, G. y S. Tashakor. "Mathematical model of impurities hide out and return in nuclear power plant steam generator". Progress in Nuclear Energy 51, n.º 4-5 (mayo de 2009): 644–48. http://dx.doi.org/10.1016/j.pnucene.2009.01.004.
Texto completoCrawford, Vincent P. y Nagore Iriberri. "Fatal Attraction: Salience, Naïveté, and Sophistication in Experimental “Hide-and-Seek” Games". American Economic Review 97, n.º 5 (1 de noviembre de 2007): 1731–50. http://dx.doi.org/10.1257/aer.97.5.1731.
Texto completoArain, Ghulam Ali, Zeeshan Bhatti, Abdul Karim Khan y Imran Hameed. "How and when do employees hide knowledge from co-workers? A multilevel moderated-mediation model". Academy of Management Proceedings 2021, n.º 1 (agosto de 2021): 13659. http://dx.doi.org/10.5465/ambpp.2021.13659abstract.
Texto completoZhu, Yong Song. "Study on Encryption and Decryption Algorithm and its Matlab Realization". Advanced Materials Research 282-283 (julio de 2011): 363–66. http://dx.doi.org/10.4028/www.scientific.net/amr.282-283.363.
Texto completoHaywood, R. D., A. C. Cameron, D. Queloz, S. C. C. Barros, M. Deleuil, R. Fares, M. Gillon et al. "Planets and Stellar Activity: Hide and Seek in the CoRoT-7 system". Proceedings of the International Astronomical Union 8, S299 (junio de 2013): 237–40. http://dx.doi.org/10.1017/s1743921313008478.
Texto completoTamboli, Meera. "Image Steganography using 3 ways of Encryption for Highly Secured Data Transmission". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (30 de junio de 2021): 4739–45. http://dx.doi.org/10.22214/ijraset.2021.35572.
Texto completoPourya, Asgarifard, Tafreshi Navid y Sharifi Akbar. "A Novel Application of Refinery Merox Unit Wastewater for Bovine Hide Unhairing". Journal of the American Leather Chemists Association 115, n.º 8 (3 de agosto de 2020): 301–8. http://dx.doi.org/10.34314/jalca.v115i8.3844.
Texto completoVu, Dong Quan, Patrick Loiseau, Alonso Silva y Long Tran-Thanh. "Path Planning Problems with Side Observations—When Colonels Play Hide-and-Seek". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 02 (3 de abril de 2020): 2252–59. http://dx.doi.org/10.1609/aaai.v34i02.5602.
Texto completoSunaga, Miho. "A SCHUMPETERIAN GROWTH MODEL WITH FINANCIAL INTERMEDIARIES". Macroeconomic Dynamics 23, n.º 4 (27 de marzo de 2018): 1679–702. http://dx.doi.org/10.1017/s1365100517000426.
Texto completoHiggi, Ali Hussain. "An Information Technology Based Instructional Model for Effective Learning". Learning and Teaching in Higher Education: Gulf Perspectives 4, n.º 1 (1 de junio de 2007): 32–42. http://dx.doi.org/10.18538/lthe.v4.n1.06.
Texto completoKing, Geoffrey y Geoff Bailey. "Tectonics and human evolution". Antiquity 80, n.º 308 (1 de junio de 2006): 265–86. http://dx.doi.org/10.1017/s0003598x00093613.
Texto completoMuadzani, Alim, Oky Dwi Nurhayati y Ike Pertiwi Windasari. "Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital". Jurnal Teknologi dan Sistem Komputer 4, n.º 3 (14 de agosto de 2016): 470. http://dx.doi.org/10.14710/jtsiskom.4.3.2016.470-478.
Texto completoRadcliffe, J. F., M. A. Garrett, T. W. B. Muxlow, R. J. Beswick, P. D. Barthel, A. T. Deller, A. Keimpema, R. M. Campbell y N. Wrigley. "Nowhere to Hide: Radio-faint AGN in GOODS-N field". Astronomy & Astrophysics 619 (noviembre de 2018): A48. http://dx.doi.org/10.1051/0004-6361/201833399.
Texto completoMolina, Jonatan, Mateu Servera y G. Leonard Burns. "Structure of ADHD/ODD Symptoms in Spanish Preschool Children: Dangers of Confirmatory Factor Analysis for Evaluation of Rating Scales". Assessment 27, n.º 8 (2 de abril de 2019): 1748–57. http://dx.doi.org/10.1177/1073191119839140.
Texto completoLiu, Hanlin, Jingju Liu, Xuehu Yan, Lintao Liu, Wanmeng Ding y Yue Jiang. "A Novel Behavior Steganography Model Based on Secret Sharing". International Journal of Digital Crime and Forensics 11, n.º 4 (octubre de 2019): 97–117. http://dx.doi.org/10.4018/ijdcf.2019100107.
Texto completoShahraeini, Sanaz y Mahdi Yaghoobi. "A New Approach in Digital Image Watermarking Using Fractal Model in DWT Domain". Advanced Materials Research 403-408 (noviembre de 2011): 3510–18. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.3510.
Texto completoLu, Yong Qiang, Fang Yong y He Xiang. "The Research on Hybrid Communication Model for Trojan Based on P2P". Advanced Materials Research 791-793 (septiembre de 2013): 2038–42. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.2038.
Texto completoChirumbolo, Salvatore. "Hormesis, resveratrol and plant-derived polyphenols: some comments". Human & Experimental Toxicology 30, n.º 12 (9 de mayo de 2011): 2027–30. http://dx.doi.org/10.1177/0960327111408153.
Texto completo