Showing 1,381 - 1,400 results of 3,132 for search '"et al."', query time: 0.06s Refine Results
  1. 1381

    Multivariate p-Adic Fermionic q-Integral on ℤp and Related Multiple Zeta-Type Functions by Min-Soo Kim, Taekyun Kim, Jin-Woo Son

    Published 2008-01-01
    “…In 2008, Jang et al. constructed generating functions of the multiple twisted Carlitz's type q-Bernoulli polynomials and obtained the distribution relation for them. …”
    Get full text
    Article
  2. 1382

    Hepatitis B Associated Monoclonal Gammopathy That Resolved after Successful Liver Transplant by P. Sreenivasan, S. Nair

    Published 2009-01-01
    “…There has been an isolated report of MGUS in patients coinfected with HIV and Hepatitis B, as the work by Amara et al. in 2006. Here, we report a case of IgA-kappa light chain gammopathy secondary to Hepatitis B infection, which resolved after liver transplantation. …”
    Get full text
    Article
  3. 1383

    Traveling Wave Solutions of the Nonlinear (3+1)-Dimensional Kadomtsev-Petviashvili Equation Using the Two Variables (𝐺′/𝐺,1/𝐺)-Expansion Method by E. M. E. Zayed, S. A. Hoda Ibrahim, M. A. M. Abdelaziz

    Published 2012-01-01
    “…This method can be considered as an extension of the basic (𝐺/𝐺)-expansion method obtained recently by Wang et al. When the parameters are replaced by special values, the well-known solitary wave solutions and the trigonometric periodic solutions of this equation were rediscovered from the traveling waves.…”
    Get full text
    Article
  4. 1384

    Cryptanalysis of a hybrid-structured onion routing scheme by Long-hai LI, Shao-feng FU, Rui-dan SU, Xiang-quan CHE

    Published 2013-04-01
    “…SHI Jin-qiao et al's hybrid-structured onion routing scheme was analysed and some security flaws were found in their design.The first flaw was derived from the malleability of its cryptographic message format which could be exploited by attackers to redirect an onion message or embed tags into it for tracing its routing path.The second flaw was the vulnerability of relay servers to chosen ciphertext attack.Three different attacks were presented that each broke the sender-receiver unlinkability entirely at a relatively low co To evade these attacks,a modified scheme was also proposed which could capture malicious nodes by using upstream investigation.…”
    Get full text
    Article
  5. 1385

    What Are the Risks of Contracting Diseases Associated with Chickens? by C. Roxanne Rutledge-Connelly, Christopher Mores, Amy H. Simonne

    Published 2005-10-01
    “…The microorganisms that cause disease can be protozoal, fungal, bacterial, chlamydial or viral (Jacob et al. 2003). Some examples of avian diseases transmissible to humans include Chlamydiosis from parakeets, pigeons, and parrots and Cryptococcosis from pigeons. …”
    Get full text
    Article
  6. 1386

    Existence Results for Nonsmooth Vector Quasi-Variational-Like Inequalities by Mohammed Alshahrani, Qamrul Hasan Ansari, Suliman Al-Homidan

    Published 2013-01-01
    “…By using the technique and methodology adopted in Al-Homidan et al. (2012), one can easily derive the relations among these inequalities and a vector quasi-optimization problem. …”
    Get full text
    Article
  7. 1387

    Weak Minimal Area in Entanglement Entropy by Shesansu Sekhar Pal, Shubhalaxmi Rath

    Published 2015-01-01
    “…We show for AdS black hole with a strip type entangling region that it is this minimality condition that makes the hypersurface unable to cross the horizon, which is in agreement with that studied earlier by Engelhardt et al. and Hubeny using a different approach. Moreover, demanding the weak minimality condition on the entanglement entropy functional with the higher derivative term puts a constraint on the Gauss-Bonnet coupling; that is, there should be an upper bound on the value of the coupling, λa<(d-3)/4(d-1).…”
    Get full text
    Article
  8. 1388

    Some Discussions on the Difference Equation xn+1=α+(xn-1m/xnk) by Awad A. Bakery

    Published 2015-01-01
    “…Our results coincide with that known for the cases m=k=1 of Amleh et al. (1999) and m=1 of Hamza and Morsy (2009). …”
    Get full text
    Article
  9. 1389

    Biology and Economic Importance of Flower Thrips by Joe Funderburk, Julianne Stavisky

    Published 2004-01-01
    “… There are about 5,000 described species of thrips (insects in the Order Thysanoptera) (Moritz et al. 2001; Mound 1997). Most feed on fungi and live in leaf litter or on dead wood. …”
    Get full text
    Article
  10. 1390

    Biology and Economic Importance of Flower Thrips by Joe Funderburk, Julianne Stavisky

    Published 2004-01-01
    “… There are about 5,000 described species of thrips (insects in the Order Thysanoptera) (Moritz et al. 2001; Mound 1997). Most feed on fungi and live in leaf litter or on dead wood. …”
    Get full text
    Article
  11. 1391

    Paesaggi di coesistenza, ovvero come attorno ad un passeriforme si articola l’abitare in una zona di montagna by Lia Zola

    Published 2024-12-01
    “… Landscapes of coexistence is a term used by a team of zoologists in a 2019 article referring to the degree of tolerance between a population of lions and humans within three African natural parks and meant as «the sustainable cohabitation of people and lions within a shared landscape» [Western et al. 2019, 204). Based on field research carried out in three alpine valleys, Valle Susa, Val Chisone and Val Troncea, my essay tries to broaden the understanding of landscapes of coexistence by arguing that they are complex sites of relationships where humans and non humans alike shape and co-shape them through interactions but also frictions and conflicts that revolve around a small bird, Petronia petronia. …”
    Get full text
    Article
  12. 1392

    Global Asymptotic Stability of a Family of Nonlinear Difference Equations by Maoxin Liao

    Published 2013-01-01
    “…Our result generalizes the corresponding results in the recent literature and simultaneously conforms to a conjecture in the work by Berenhaut et al. (2007).…”
    Get full text
    Article
  13. 1393

    Optimal Imputation Methods under Stratified Ranked Set Sampling by Shashi Bhushan, Anoop Kumar

    Published 2025-02-01
    “…It has been shown that the proposed imputation methods become superior than the mean imputation method, ratio imputation method, Diana and Perri (2010) type imputation method and Sohail et al. (2018) type imputation methods. A simulation study is administered over two hypothetically drawn asymmetric populations. …”
    Get full text
    Article
  14. 1394

    Security analysis and improvement of strongly secure certificate less signature scheme by Ai-wan FAN, Zhao-feng YANG, Li-ming XIE

    Published 2014-05-01
    “…By analyzing the security of strongly secure certificateless signature scheme proposed by Wang Yafei et al, the problem that the scheme could not resist public key replacement attack under dishonest KGC was pointed out. …”
    Get full text
    Article
  15. 1395

    Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA by WU Zhen, CHEN Yun, CHEN Jun, WANG Min

    Published 2010-01-01
    “…A power analysis model on modulo exponentiation’s computation suitable for real environment was presented in the basis of analysis to the great amount of power traces in the rough.And a method of signal processing for extracting exponential information from the initial power traces was inferred too.Hereby,a power analysis platform was designed and implemented.The exponential information submerged in power traces of 32bit modulo exponentiation algorithms applied in a FPGA chip was successfully extracted where after.Meanwhile,a conclusion about SPA attack on RSA made by Messerges et al,such as the problem with an SPA attack was that the information about the secret key was difficult to directly observe,was proved to be incorrect.Finally,the static masking algorithm for modulo exponentiation of anti-SPA attack was also validated in this testing platform.…”
    Get full text
    Article
  16. 1396

    Powdery Mildew on Nasturtium in South Florida by Pamela Roberts, Katherine E. Hendricks, Francesco Di Gioia, Joubert Fayette, Monica Ozores-Hampton

    Published 2017-06-01
    “….), was found in southwest Florida for the first time in 2015 (Fayette et al. 2016). This two-page fact sheet describes the pathogen, its symptoms, and how to manage it. …”
    Get full text
    Article
  17. 1397

    Climate-Aware Machine Learning for Above-Ground Biomass Estimation by Aske Meineche

    Published 2024-12-01
    “…The research aims to compare the effectiveness of temporal and spatial modelling techniques in AGBM estimation and to assess the utility of the AI-Climate Alignment Framework proposed by Kaack et al. (2022) in guiding environmentally responsible model development. …”
    Get full text
    Article
  18. 1398

    LA ESTRUCTURA DE LA TEORÍA EMPÍRICA Y EL REDUCCIONISMO by Thomas Meier

    Published 2015-02-01
    “…En una tercera parte discutiré si la posición de Ladyman, Ross, et. al. (2007) sobre el reduccionismo presenta una vía prometedora para posicionarse en el debate.…”
    Get full text
    Article
  19. 1399

    L’augmentation de contenu venant des relations publiques dans les nouvelles québécoises entre 1988 et 2016 : le cas de six quotidiens by Chantal Francœur

    Published 2018-09-01
    “…This trend is the key finding to emerge from a quantitative analysis of six Quebec dailies that we undertook in 2016, and that echoes the methodological approach used by Tremblay, Saint-Laurent, Saint-Jean and Carontini (1988) in their earlier study of the same phenomenon. Whereas Tremblay et al. established that in 1988, almost 50% of Quebec news stories contained content derived from a PR source, our study found that by 2016, that figure had risen to between 66 and 76%. …”
    Get full text
    Article
  20. 1400

    The educational potential of collaborative writing mediated by digital technology in times of pandemic: a scoping review by Liverano Giuseppe

    Published 2024-06-01
    “…This approach fosters the transformation of knowledge through a trialogical approach to learning (Cesareni et al., 2018). This article analyzes the responses of a collaborative writing experience with apps in a school. …”
    Get full text
    Article