Showing 61 - 80 results of 819 for search '"destroyer"', query time: 0.04s Refine Results
  1. 61

    Determining the Value of an Orchard Tree by Edward Evans, Carlos Balerdi, Jonathan Crane, Sikavas Nalampang

    Published 2006-12-01
    “… FE676, a 4-page illustrated fact sheet by Edward Evans, Carlos Balerdi, Jonathan Crane, and Sikavas Nalampang, provides step-by-step instructions for using the agecon-trec software program to estimate the value of a tree that has been destroyed. Published by the UF Department of Food and Resource Economics, November 2006. …”
    Get full text
    Article
  2. 62

    Determining the Value of an Orchard Tree by Edward Evans, Carlos Balerdi, Jonathan Crane, Sikavas Nalampang

    Published 2006-12-01
    “… FE676, a 4-page illustrated fact sheet by Edward Evans, Carlos Balerdi, Jonathan Crane, and Sikavas Nalampang, provides step-by-step instructions for using the agecon-trec software program to estimate the value of a tree that has been destroyed. Published by the UF Department of Food and Resource Economics, November 2006. …”
    Get full text
    Article
  3. 63

    An Experimental Study on the Creep Characteristics of Sandstone in the Interval of Different Critical Stresses by Chao Yang, Xingchen Dong, Xuan Xu, Qiancheng Sun

    Published 2021-01-01
    “…When σ1 is larger than σcd, the time required for the failure of specimen tf decreases with the increase of σ1; the creep rate dε/dt increases with time t, and the specimen will be destroyed when it reaches a maximum value (dε/dt)max. …”
    Get full text
    Article
  4. 64

    Keeping and Archiving Financial Statements, Accounting Records, and Finance and Accounting Documents by Elena STĂNCIULESCU

    Published 2025-01-01
    “…Accounting professionals must be aware that, in addition to preparing and using supporting and accounting documents, their recording in accounting, the reconstruction of lost, stolen or destroyed documents, keeping and archiving these documents play a very important role.…”
    Get full text
    Article
  5. 65

    Proletcultismul (I) by Dumitru Micu

    Published 2007-12-01
    “…Considering the implications of ”proletcultist” (the cult of proletarian values) literature, we can notice that proletcultism has in common with the vanguard currents the programmatic request of destroying libraries, museums and universities. That is everything related to academic tradition. …”
    Get full text
    Article
  6. 66

    Research the causes of formation of internal pores (blowholes) in welded joints of metal wire cord by I. V. Borisovets, T. P. Kurenkova, A. A. Sakharnaja

    Published 2019-01-01
    “…Analysis of the research results shows that about 20% of defective weld joints of the metal wire cord are destroyed due to the presence of internal pores in the weld zone. …”
    Get full text
    Article
  7. 67

    Mechanical Characteristics of Coal Samples under Triaxial Unloading Pressure with Different Test Paths by Yang Zhang, Yongjie Yang, Depeng Ma

    Published 2020-01-01
    “…This shows that samples are more easily destroyed under higher unloading rates and the samples are more difficultly destroyed under lower unloading rates. …”
    Get full text
    Article
  8. 68

    Late Blight of Potato and Tomato by Ryan Donahoo, Pamela Roberts

    Published 2013-01-01
    “…Both potato and tomato are susceptible to late blight, an aggressive disease capable of rapidly destroying entire fields. The disease is distributed worldwide and occurs wherever tomatoes or potatoes are grown, and conditions favor disease development. …”
    Get full text
    Article
  9. 69

    Late Blight of Potato and Tomato by Ryan Donahoo, Pamela Roberts

    Published 2013-01-01
    “…Both potato and tomato are susceptible to late blight, an aggressive disease capable of rapidly destroying entire fields. The disease is distributed worldwide and occurs wherever tomatoes or potatoes are grown, and conditions favor disease development. …”
    Get full text
    Article
  10. 70

    Achieving cultural heritage with multisensory virtual reality technologies by Miguel Melo

    Published 2022-04-01
    “…A fact is that everyday pieces of cultural heritage are lost, whether due to natural phenomena that can destroy the natural landscapes or cultural traditions that are slowly and naturally disappears. …”
    Get full text
    Article
  11. 71

    Performance Analysis of a Photovoltaic-Thermal Integrated System by Ewa Radziemska

    Published 2009-01-01
    “…In this paper the performance analysis of a hybrid PV/T system is presented: an energetic analysis as well as an exergetic analysis. Exergy is always destroyed when a process involves a temperature change. …”
    Get full text
    Article
  12. 72

    German Policy Towards Muslim Communities by L. R. Sadykova

    Published 2014-12-01
    “…During the post-war period the need of Europe in foreign labor for restoration of the economy destroyed by war, laid the foundation of mass international migration to this region. …”
    Get full text
    Article
  13. 73

    Un-Healthy Marital Interactions: What Not To Do and What Can Be Done! by Eboni J. Baugh

    Published 2006-08-01
    “…Baugh, takes a different approach to relationship advice by focusing on four negative patterns of interaction which have been demonstrated to be major destroyers of marital relationships: criticism, contempt, defensiveness, and stonewalling. …”
    Get full text
    Article
  14. 74

    Un-Healthy Marital Interactions: What Not To Do and What Can Be Done! by Eboni J. Baugh

    Published 2006-08-01
    “…Baugh, takes a different approach to relationship advice by focusing on four negative patterns of interaction which have been demonstrated to be major destroyers of marital relationships: criticism, contempt, defensiveness, and stonewalling. …”
    Get full text
    Article
  15. 75

    The Architectural Layout and Degree of Preservation of the Sanctuary of Pachacamac Archaeological Complex (2nd to 16th Centuries AD, Peru) from the Morphometric Analysis of Orthoph... by Luigi Magnini, Pierdomenico Del Gaudio, Maria Ilaria Pannaccione Apa, Denise Pozzi-Escot, Janet Oshiro, Rommel Angeles, Guido Ventura

    Published 2024-12-01
    “…We applied a modified TPI classification to measure the different degrees of preservation of the walls of the archaeological structures and recognize preserved, partly preserved, partly destroyed, and destroyed walls. The walls of the site show different degrees of preservation related to the damage associated with earthquakes and El Niño destructive events. …”
    Get full text
    Article
  16. 76

    Trusted coalition-proof protocol model based on secure multi-part computing by CHENG Bai-liang1, ZENG Guo-sun1, JIE An-quan2

    Published 2011-01-01
    “…N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-proof protocol model was proposed.The concept of correlated equilibrium was used by the model in game theory for talking place the trusted third party.…”
    Get full text
    Article
  17. 77

    Stability of Stochastic Differential Delay Systems with Delayed Impulses by Yanlei Wu

    Published 2014-01-01
    “…Moreover, it is also shown that if a continuous dynamic system is stable, then, under some conditions, the delayed impulses do not destroy the stability of the systems. The effectiveness of the proposed results is illustrated by two examples.…”
    Get full text
    Article
  18. 78

    WEIGHT VARIATIONS IN NEWBORN DOMESTIC PIGS AND THE ADAPTATION PROCESS by S. V. Nikitin, S. P. Knyazev, V. I. Ermolaev

    Published 2015-01-01
    “…The first period forms a positive link between weight at birth and weight in maturity, and the second period destroys that link.…”
    Get full text
    Article
  19. 79

    Consistency of group key exchange protocols by CAO Chun-jie1, MA Jian-feng1, GUO Yuan-bo2

    Published 2008-01-01
    “…These attacks will result in that all the members have different view of peers’ identities and destroying the integrity of the current group. Furthermore,improvements to overcome the security vulnerabilities of these protocols were proposed.…”
    Get full text
    Article
  20. 80

    Handling Money: Credit Use by Mary N. Harrison

    Published 2019-05-01
    “…Used wisely, credit will enable you to have a good quality of life. Misused, it will destroy your quality of life. Unfortunately many people do not know how to shop for and use credit wisely. …”
    Get full text
    Article