Filters








20,017 Hits in 10.3 sec

Educational Research

S. A. Courtis, P. C. Packer
1920 The Journal of educational research (Washington, D.C.)  
able to organize, direct, and utilize, research activities in his field.  ...  Several of the departments would need a large staff of specialists. If we attempt to list these departments in logical order we must begin with (1) the department of sociological research.  ... 
doi:10.1080/00220671.1920.10879019 fatcat:o7v7gjdwxve4xffdtuhj5uelbe

THE ADVANCEMENT OF HORTICULTURAL RESEARCH

A. T. Erwin
1931 Science  
That research in horti- culture should catch up, so to speak, and take a position in the advance guard and open the way for new applications goes without saying.  ...  With a more limited objective and a more direct attack the project will probably be less pro- tracted, though I do not think this should be the point of emphasis.  ... 
doi:10.1126/science.73.1890.303 pmid:17811581 fatcat:wlbydiva6rfzzizn7jjvvthgjy

Research in Pharmacology

Guillaume Valette
1960 American Journal of Health-System Pharmacy  
In whatever scientific field one takes, the question of research can be considered in relation to its needs, its methods, its different orientations; and the subject can be discussed with regard to education  ...  Evidently this implies a revision of the status of the research worker, to remove the handicap our laboratcries have to put up with.  ... 
doi:10.1093/ajhp/17.7.418 fatcat:oywgceyynnazphriu46jdvepu4

Foundations of scientific research (Foundations of Research Activities) [article]

N. M. Glazunov
2012 arXiv   pre-print
Scientific research in Artificial Intelligence. Compilers and compilation. Objective, Concepts and History of Computer security. Methodological and categorical apparatus of scientific research.  ...  During years 2008 to 2011 author gives several courses on Foundations of Scientific Research at Computer Science Faculty of the National Aviation University in Kiev.  ...  G 4 ={V,E} ind(V1)=2 oud(V1)=1 ind(V2)=1 oud(V2)=2 ind(V3)=2 oud(V3)=0 ind(V4)=1 oud(V4)=2 d(V)=ind(V)+oud(V) Trees and formulas A tree is a connected (directed) graph with the following properties:  ... 
arXiv:1212.1651v1 fatcat:e3oe5neztff5vjlj4trchbi3qa

A Century of Biological Research

Harlow B. Mills, George C. Decker, Herbert H. Ross, J. Cedric Carter, George William Bennett, Thomas G. Scott, James S. Ayars, Ruth R. Warrick, Bessie B. East
1958 Illinois Natural History Survey bulletin  
Illinois Natural History Survey (and its predecessors) 1858-1958, covering the major areas of work including economic entomology, faunistic surveys, botany and plant pathology, aquatic biology, wildlife research  ...  The tree in winter. III Hart, Charles A., and Henry Allan Gleason 1907. On the biology of the sand areas of Illinois. III. Lab. Nat. Hist. Bui. 7(7):137-272 + l map, 16 pis.  ...  David Hiram Zoologist, 1923 Titus, Edward Sharp Gaige Entomologist, 1902Entomologist, -1903 TowNSEND, Lee Hill Entomologist, 1932Entomologist, -1936 Trumbower, John Abbott Occurrence of rare plants in  ... 
doi:10.21900/j.inhs.v27.171 fatcat:qolohepjwjhlri7sktdygij7u4

Food Research under the Department of Scientific and Industrial Research

F. Kidd
1951 Proceedings of the Royal Society A  
Accordingly, committees consisting approximately in equal parts of men of science and leaders of industry were set up for fish preservation, engineering, meat preservation, oils and fats, fruit and vegetables  ...  In this address I have endeavoured to put before you a picture of the development and work of a young and growing research Institute closely associated with an intensely interesting and nationally highly  ...  storage units for th a t portion of the crop needed by the consumer after the end of April and before the new crop comes in.  ... 
doi:10.1098/rspa.1951.0043 fatcat:xrzjc4mzivbnjhcl3giwycavsy

Emerald Ash Borer in North America: A Research and Regulatory Challenge

David Cappaert, Deborah G. McCullough, Therese M. Poland, Nathan W. Siegert
2005 American Entomologist  
Dept. of Agriculture Agricultural Research Service.  ...  Acknowledgment We thank Andrea Agius for leading field work on emerald ash borer host range; Peter de Groot, Gary Grant, and Linda McDonald for assisting with GC-EAD analysis and field trapping experiments  ...  Ash, a favored tree for urban settings, was one of the most commonly planted trees in new residential and industrial developments within the southeastern Michigan area.  ... 
doi:10.1093/ae/51.3.152 fatcat:rz5t5an3njdhpe5mumxshzsjqi

Comparative effectiveness research in neurotrauma

Shelly D. Timmons, Steven A. Toms
2012 Neurosurgical Focus  
Documents are on file for public inspection in the Office of the Federal Register the day before they are published, unless the issuing agency requests earlier filing.  ...  The Federal Register is published in paper and on 24x microfiche. It is also available online at no charge at www.fdsys.gov, a service of the U.S. Government Printing Office.  ...  Proposal The primary management tools for reducing beetle-caused tree mortality are removing infested trees, and reducing the density of remaining trees to lessen the susceptibility to attack.  ... 
doi:10.3171/2012.6.focus1296 pmid:22746235 fatcat:jz4p245zyvhydnyawblkblih7e

Static Analyzers and Potential Future Research Directions for Scala: An Overview [article]

Eljose E Sajan, Yunpeng Zhang, Liang-Chieh Cheng
2019 arXiv   pre-print
This paper discusses in detail about the types of defects that each of these tools can detect, limitations of these tools and also provide potential research direction that can improve the current state  ...  The Scala programming language has been gaining wider adoption across various industries in recent years.  ...  The research from [35] denotes the need for a secure XML validator for functional programming languages like Scala.  ... 
arXiv:1905.04752v1 fatcat:zg34ztb5bvgarhdneaoneqa7le

Network forensic frameworks: Survey and research challenges

Emmanuel S. Pilli, R.C. Joshi, Rajdeep Niyogi
2010 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
The specific research gaps existing in implementation frameworks, process models and analysis tools are identified and major challenges are highlighted.  ...  in exploring this upcoming and young discipline.  ...  adds new samples to the fuzzy decision tree that has been constructed and also adjusts the optimal tree size, and fuzzy inferencer fuzzifies input values and processes them with the rule base.  ... 
doi:10.1016/j.diin.2010.02.003 fatcat:oapmpcdfarenlabt5bun64dgpa

The Management of Natural Resources: An Overview and Research Agenda

Gerard George, Simon J. D. Schillebeeckx, Teng Lit Liak
2015 Academy of Management Journal  
Global warming sooner than later is going to catch up with you, whether you deny it exists or not. Where we need leadership is to decide the direction and put all our efforts towards it.  ...  Given unpredictable externalities and complex resource interactions, firms will need to engage with stakeholders in proactive ways.  ... 
doi:10.5465/amj.2015.4006 fatcat:hr3wwpiujjfl3odx7mb7vc7vbe

Exploiting Tragedy: Dark Tourism

Shiladitya Verma
2013 Social Science Research Network  
India is slowly catching up on this global phenomenon. We still have a long way to go, but there is a start.  ...  And the one of latest in this is "Dark Tourism".  ...  India is slowly catching up, but still a lot more is to be done, if the desired results are to be achieved. But one should also keep in mind the negative side of this.  ... 
doi:10.2139/ssrn.2306870 fatcat:bfcxp633s5aodig7up3sgfpwam

Ransomware Remedial Through Virtualization

R. Ilangovan, Y.K. Chua, S.H. Kok
2020 International Journal of Innovative Research in Applied Sciences and Engineering  
In the worst-case scenario, the end-user should be able to deal with the scenario appropriately by not giving in to the demands of the attacker via our solution.  ...  There are many attacks such attacks since 2012, notable ones namely WannaCry and Petya. These attacks had costed millions, maybe even billions of dollars in economic losses.  ...  There are many researches on ransomware behaviour to properly devise a new and efficient method to deal with such issues.  ... 
doi:10.29027/ijirase.v3.i7.2020.498-502 fatcat:y6mzfuv65fc5tlqpuq46kyfh24

Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research

Majda Wazzan, Daniyal Algazzawi, Omaima Bamasaq, Aiiad Albeshri, Li Cheng
2021 Applied Sciences  
As a result of this study, the authors analyzed the current research gaps and suggest future research directions.  ...  At the same time, it has resulted in an increase in cybersecurity risks due to the lack of security for IoT devices.  ...  Acknowledgments: This research was funded by Institutional Fund Projects under grant number IFPRC-106-611-2020.  ... 
doi:10.3390/app11125713 fatcat:d56mns6avfhwtk4rqkwxoomoqi

Participatory Research towards Food System Redesign: Italian Case Study and Perspectives

Corrado Ciaccia, Marta Di Pierro, Elena Testani, Giancarlo Roccuzzo, Marcello Cutuli, Danilo Ceccarelli
2019 Sustainability  
These activities led to: (i) the definition of a research protocol based on farmers' research needs for a new long-term experiment; (ii) committing farmers to take an active role in the research; and (  ...  On the contrary, a holistic perspective towards a new food-system design could meet the needs of a larger share of stakeholders.  ...  Special thanks to AIAB for the support in activating the process and to Maria Ciaccia and Alexander Stross for extensive English editing in the revision phase.  ... 
doi:10.3390/su11247138 fatcat:o5yorxcc5veulgel7gboj4ekla
« Previous Showing results 1 — 15 out of 20,017 results