Suggested Topics within your search.
Suggested Topics within your search.
- methods 9
- Management 6
- Anesthesia 5
- Nursing 5
- Research 5
- Biochemistry 4
- Economic conditions 4
- Education 4
- Evaluation 4
- Nursing Assessment 4
- Nursing Care 4
- Obstetrics 4
- Psychology 4
- Surgical nursing 4
- Accounting 3
- Biology 3
- Critical Care 3
- Diseases 3
- Emergencies 3
- Human geography 3
- Information Science 3
- Internal medicine 3
- Juvenile literature 3
- Microbiology 3
- Politics and government 3
- therapy 3
- Anesthetics 2
- Arithmetic 2
- Authorship 2
- Banks and banking 2
-
1381
Multivariate p-Adic Fermionic q-Integral on ℤp and Related Multiple Zeta-Type Functions
Published 2008-01-01“…In 2008, Jang et al. constructed generating functions of the multiple twisted Carlitz's type q-Bernoulli polynomials and obtained the distribution relation for them. …”
Get full text
Article -
1382
Hepatitis B Associated Monoclonal Gammopathy That Resolved after Successful Liver Transplant
Published 2009-01-01“…There has been an isolated report of MGUS in patients coinfected with HIV and Hepatitis B, as the work by Amara et al. in 2006. Here, we report a case of IgA-kappa light chain gammopathy secondary to Hepatitis B infection, which resolved after liver transplantation. …”
Get full text
Article -
1383
Traveling Wave Solutions of the Nonlinear (3+1)-Dimensional Kadomtsev-Petviashvili Equation Using the Two Variables (𝐺′/𝐺,1/𝐺)-Expansion Method
Published 2012-01-01“…This method can be considered as an extension of the basic (𝐺/𝐺)-expansion method obtained recently by Wang et al. When the parameters are replaced by special values, the well-known solitary wave solutions and the trigonometric periodic solutions of this equation were rediscovered from the traveling waves.…”
Get full text
Article -
1384
Cryptanalysis of a hybrid-structured onion routing scheme
Published 2013-04-01“…SHI Jin-qiao et al's hybrid-structured onion routing scheme was analysed and some security flaws were found in their design.The first flaw was derived from the malleability of its cryptographic message format which could be exploited by attackers to redirect an onion message or embed tags into it for tracing its routing path.The second flaw was the vulnerability of relay servers to chosen ciphertext attack.Three different attacks were presented that each broke the sender-receiver unlinkability entirely at a relatively low co To evade these attacks,a modified scheme was also proposed which could capture malicious nodes by using upstream investigation.…”
Get full text
Article -
1385
What Are the Risks of Contracting Diseases Associated with Chickens?
Published 2005-10-01“…The microorganisms that cause disease can be protozoal, fungal, bacterial, chlamydial or viral (Jacob et al. 2003). Some examples of avian diseases transmissible to humans include Chlamydiosis from parakeets, pigeons, and parrots and Cryptococcosis from pigeons. …”
Get full text
Article -
1386
Existence Results for Nonsmooth Vector Quasi-Variational-Like Inequalities
Published 2013-01-01“…By using the technique and methodology adopted in Al-Homidan et al. (2012), one can easily derive the relations among these inequalities and a vector quasi-optimization problem. …”
Get full text
Article -
1387
Weak Minimal Area in Entanglement Entropy
Published 2015-01-01“…We show for AdS black hole with a strip type entangling region that it is this minimality condition that makes the hypersurface unable to cross the horizon, which is in agreement with that studied earlier by Engelhardt et al. and Hubeny using a different approach. Moreover, demanding the weak minimality condition on the entanglement entropy functional with the higher derivative term puts a constraint on the Gauss-Bonnet coupling; that is, there should be an upper bound on the value of the coupling, λa<(d-3)/4(d-1).…”
Get full text
Article -
1388
Some Discussions on the Difference Equation xn+1=α+(xn-1m/xnk)
Published 2015-01-01“…Our results coincide with that known for the cases m=k=1 of Amleh et al. (1999) and m=1 of Hamza and Morsy (2009). …”
Get full text
Article -
1389
Biology and Economic Importance of Flower Thrips
Published 2004-01-01“… There are about 5,000 described species of thrips (insects in the Order Thysanoptera) (Moritz et al. 2001; Mound 1997). Most feed on fungi and live in leaf litter or on dead wood. …”
Get full text
Article -
1390
Biology and Economic Importance of Flower Thrips
Published 2004-01-01“… There are about 5,000 described species of thrips (insects in the Order Thysanoptera) (Moritz et al. 2001; Mound 1997). Most feed on fungi and live in leaf litter or on dead wood. …”
Get full text
Article -
1391
Paesaggi di coesistenza, ovvero come attorno ad un passeriforme si articola l’abitare in una zona di montagna
Published 2024-12-01“… Landscapes of coexistence is a term used by a team of zoologists in a 2019 article referring to the degree of tolerance between a population of lions and humans within three African natural parks and meant as «the sustainable cohabitation of people and lions within a shared landscape» [Western et al. 2019, 204). Based on field research carried out in three alpine valleys, Valle Susa, Val Chisone and Val Troncea, my essay tries to broaden the understanding of landscapes of coexistence by arguing that they are complex sites of relationships where humans and non humans alike shape and co-shape them through interactions but also frictions and conflicts that revolve around a small bird, Petronia petronia. …”
Get full text
Article -
1392
Global Asymptotic Stability of a Family of Nonlinear Difference Equations
Published 2013-01-01“…Our result generalizes the corresponding results in the recent literature and simultaneously conforms to a conjecture in the work by Berenhaut et al. (2007).…”
Get full text
Article -
1393
Optimal Imputation Methods under Stratified Ranked Set Sampling
Published 2025-02-01“…It has been shown that the proposed imputation methods become superior than the mean imputation method, ratio imputation method, Diana and Perri (2010) type imputation method and Sohail et al. (2018) type imputation methods. A simulation study is administered over two hypothetically drawn asymmetric populations. …”
Get full text
Article -
1394
Security analysis and improvement of strongly secure certificate less signature scheme
Published 2014-05-01“…By analyzing the security of strongly secure certificateless signature scheme proposed by Wang Yafei et al, the problem that the scheme could not resist public key replacement attack under dishonest KGC was pointed out. …”
Get full text
Article -
1395
Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA
Published 2010-01-01“…A power analysis model on modulo exponentiation’s computation suitable for real environment was presented in the basis of analysis to the great amount of power traces in the rough.And a method of signal processing for extracting exponential information from the initial power traces was inferred too.Hereby,a power analysis platform was designed and implemented.The exponential information submerged in power traces of 32bit modulo exponentiation algorithms applied in a FPGA chip was successfully extracted where after.Meanwhile,a conclusion about SPA attack on RSA made by Messerges et al,such as the problem with an SPA attack was that the information about the secret key was difficult to directly observe,was proved to be incorrect.Finally,the static masking algorithm for modulo exponentiation of anti-SPA attack was also validated in this testing platform.…”
Get full text
Article -
1396
Powdery Mildew on Nasturtium in South Florida
Published 2017-06-01“….), was found in southwest Florida for the first time in 2015 (Fayette et al. 2016). This two-page fact sheet describes the pathogen, its symptoms, and how to manage it. …”
Get full text
Article -
1397
Climate-Aware Machine Learning for Above-Ground Biomass Estimation
Published 2024-12-01“…The research aims to compare the effectiveness of temporal and spatial modelling techniques in AGBM estimation and to assess the utility of the AI-Climate Alignment Framework proposed by Kaack et al. (2022) in guiding environmentally responsible model development. …”
Get full text
Article -
1398
LA ESTRUCTURA DE LA TEORÍA EMPÍRICA Y EL REDUCCIONISMO
Published 2015-02-01“…En una tercera parte discutiré si la posición de Ladyman, Ross, et. al. (2007) sobre el reduccionismo presenta una vía prometedora para posicionarse en el debate.…”
Get full text
Article -
1399
L’augmentation de contenu venant des relations publiques dans les nouvelles québécoises entre 1988 et 2016 : le cas de six quotidiens
Published 2018-09-01“…This trend is the key finding to emerge from a quantitative analysis of six Quebec dailies that we undertook in 2016, and that echoes the methodological approach used by Tremblay, Saint-Laurent, Saint-Jean and Carontini (1988) in their earlier study of the same phenomenon. Whereas Tremblay et al. established that in 1988, almost 50% of Quebec news stories contained content derived from a PR source, our study found that by 2016, that figure had risen to between 66 and 76%. …”
Get full text
Article -
1400
The educational potential of collaborative writing mediated by digital technology in times of pandemic: a scoping review
Published 2024-06-01“…This approach fosters the transformation of knowledge through a trialogical approach to learning (Cesareni et al., 2018). This article analyzes the responses of a collaborative writing experience with apps in a school. …”
Get full text
Article