Suggested Topics within your search.
Suggested Topics within your search.
- Animal welfare 1
- Animals 1
- Brothers and sisters 1
- Cultural property 1
- Desertions 1
- Elias (Fictitious character) 1
- Fantasy 1
- Fugitives from justice 1
- Group homes for youth 1
- Historic preservation 1
- History 1
- Imaginary places 1
- Intelligence service 1
- Laia (Fictitious character) 1
- Management 1
- Orphans 1
- Prisons 1
- Protection 1
- Rats 1
- Repatriation 1
- Romance fiction 1
- Treatment 1
- Vietnam War, 1961-1975 1
-
61
Determining the Value of an Orchard Tree
Published 2006-12-01“… FE676, a 4-page illustrated fact sheet by Edward Evans, Carlos Balerdi, Jonathan Crane, and Sikavas Nalampang, provides step-by-step instructions for using the agecon-trec software program to estimate the value of a tree that has been destroyed. Published by the UF Department of Food and Resource Economics, November 2006. …”
Get full text
Article -
62
Determining the Value of an Orchard Tree
Published 2006-12-01“… FE676, a 4-page illustrated fact sheet by Edward Evans, Carlos Balerdi, Jonathan Crane, and Sikavas Nalampang, provides step-by-step instructions for using the agecon-trec software program to estimate the value of a tree that has been destroyed. Published by the UF Department of Food and Resource Economics, November 2006. …”
Get full text
Article -
63
An Experimental Study on the Creep Characteristics of Sandstone in the Interval of Different Critical Stresses
Published 2021-01-01“…When σ1 is larger than σcd, the time required for the failure of specimen tf decreases with the increase of σ1; the creep rate dε/dt increases with time t, and the specimen will be destroyed when it reaches a maximum value (dε/dt)max. …”
Get full text
Article -
64
Keeping and Archiving Financial Statements, Accounting Records, and Finance and Accounting Documents
Published 2025-01-01“…Accounting professionals must be aware that, in addition to preparing and using supporting and accounting documents, their recording in accounting, the reconstruction of lost, stolen or destroyed documents, keeping and archiving these documents play a very important role.…”
Get full text
Article -
65
Proletcultismul (I)
Published 2007-12-01“…Considering the implications of ”proletcultist” (the cult of proletarian values) literature, we can notice that proletcultism has in common with the vanguard currents the programmatic request of destroying libraries, museums and universities. That is everything related to academic tradition. …”
Get full text
Article -
66
Research the causes of formation of internal pores (blowholes) in welded joints of metal wire cord
Published 2019-01-01“…Analysis of the research results shows that about 20% of defective weld joints of the metal wire cord are destroyed due to the presence of internal pores in the weld zone. …”
Get full text
Article -
67
Mechanical Characteristics of Coal Samples under Triaxial Unloading Pressure with Different Test Paths
Published 2020-01-01“…This shows that samples are more easily destroyed under higher unloading rates and the samples are more difficultly destroyed under lower unloading rates. …”
Get full text
Article -
68
Late Blight of Potato and Tomato
Published 2013-01-01“…Both potato and tomato are susceptible to late blight, an aggressive disease capable of rapidly destroying entire fields. The disease is distributed worldwide and occurs wherever tomatoes or potatoes are grown, and conditions favor disease development. …”
Get full text
Article -
69
Late Blight of Potato and Tomato
Published 2013-01-01“…Both potato and tomato are susceptible to late blight, an aggressive disease capable of rapidly destroying entire fields. The disease is distributed worldwide and occurs wherever tomatoes or potatoes are grown, and conditions favor disease development. …”
Get full text
Article -
70
Achieving cultural heritage with multisensory virtual reality technologies
Published 2022-04-01“…A fact is that everyday pieces of cultural heritage are lost, whether due to natural phenomena that can destroy the natural landscapes or cultural traditions that are slowly and naturally disappears. …”
Get full text
Article -
71
Performance Analysis of a Photovoltaic-Thermal Integrated System
Published 2009-01-01“…In this paper the performance analysis of a hybrid PV/T system is presented: an energetic analysis as well as an exergetic analysis. Exergy is always destroyed when a process involves a temperature change. …”
Get full text
Article -
72
German Policy Towards Muslim Communities
Published 2014-12-01“…During the post-war period the need of Europe in foreign labor for restoration of the economy destroyed by war, laid the foundation of mass international migration to this region. …”
Get full text
Article -
73
Un-Healthy Marital Interactions: What Not To Do and What Can Be Done!
Published 2006-08-01“…Baugh, takes a different approach to relationship advice by focusing on four negative patterns of interaction which have been demonstrated to be major destroyers of marital relationships: criticism, contempt, defensiveness, and stonewalling. …”
Get full text
Article -
74
Un-Healthy Marital Interactions: What Not To Do and What Can Be Done!
Published 2006-08-01“…Baugh, takes a different approach to relationship advice by focusing on four negative patterns of interaction which have been demonstrated to be major destroyers of marital relationships: criticism, contempt, defensiveness, and stonewalling. …”
Get full text
Article -
75
The Architectural Layout and Degree of Preservation of the Sanctuary of Pachacamac Archaeological Complex (2nd to 16th Centuries AD, Peru) from the Morphometric Analysis of Orthoph...
Published 2024-12-01“…We applied a modified TPI classification to measure the different degrees of preservation of the walls of the archaeological structures and recognize preserved, partly preserved, partly destroyed, and destroyed walls. The walls of the site show different degrees of preservation related to the damage associated with earthquakes and El Niño destructive events. …”
Get full text
Article -
76
Trusted coalition-proof protocol model based on secure multi-part computing
Published 2011-01-01“…N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-proof protocol model was proposed.The concept of correlated equilibrium was used by the model in game theory for talking place the trusted third party.…”
Get full text
Article -
77
Stability of Stochastic Differential Delay Systems with Delayed Impulses
Published 2014-01-01“…Moreover, it is also shown that if a continuous dynamic system is stable, then, under some conditions, the delayed impulses do not destroy the stability of the systems. The effectiveness of the proposed results is illustrated by two examples.…”
Get full text
Article -
78
WEIGHT VARIATIONS IN NEWBORN DOMESTIC PIGS AND THE ADAPTATION PROCESS
Published 2015-01-01“…The first period forms a positive link between weight at birth and weight in maturity, and the second period destroys that link.…”
Get full text
Article -
79
Consistency of group key exchange protocols
Published 2008-01-01“…These attacks will result in that all the members have different view of peers’ identities and destroying the integrity of the current group. Furthermore,improvements to overcome the security vulnerabilities of these protocols were proposed.…”
Get full text
Article -
80
Handling Money: Credit Use
Published 2019-05-01“…Used wisely, credit will enable you to have a good quality of life. Misused, it will destroy your quality of life. Unfortunately many people do not know how to shop for and use credit wisely. …”
Get full text
Article