Suggested Topics within your search.
Suggested Topics within your search.
- History 14
- Politics and government 8
- Social conditions 8
- Biochemistry 6
- Law 6
- methods 6
- Electric wiring, Interior 5
- Health 5
- Juvenile literature 5
- Physical fitness 5
- Sociology 5
- Digital techniques 4
- Economic conditions 4
- Economic policy 4
- Management 4
- Nursing 4
- Photography 4
- Race relations 4
- Social policy 4
- Social problems 4
- Cultural pluralism 3
- Discrimination 3
- Domestic relations 3
- Education 3
- Electric wiring 3
- Ethnic relations 3
- Ethnology 3
- Gays 3
- Health and Fitness 3
- History and criticism 3
-
13521
Light Regulates Secreted Metabolite Production and Antagonistic Activity in <i>Trichoderma</i>
Published 2024-12-01“…The 6-PP extraction using ethyl acetate provided a rapid and efficient process to recover this metabolite. …”
Get full text
Article -
13522
Synthesis of Novel Azetidinone and Thiazolidinones Derivatives and Evaluation of Their Antimicrobial Efficacy
Published 2006-01-01“…These anils on cyclocondensation reaction with chloro acetyl chloride and thio glycolic acid (i.e. mercapto acetic acid) yields 2-azetidinones and 4-thiazolidinones respectively. …”
Get full text
Article -
13523
Beneficios para la salud de la semilla y perfil nutricional de 35 cultivares de calabaza
Published 2023-04-01“… La semilla de calabaza (Cucurbita pepo L.) es alta en aceite, proteína, y ácidos grasos no saturados (AENS), y es una importante fuente de nutrición y ganancias a nivel global. …”
Get full text
Article -
13524
A Hardware Accelerator for the Inference of a Convolutional Neural network
Published 2019-11-01“…Our implementation achieved a of accuracy for the MNIST database using only 12-bits fixed-point format. The results show that the co-processing scheme operating at a conservative speed of 100 MHz can identify around 441 images per second, which is about 17% times faster than a 650 MHz - software implementation. …”
Get full text
Article -
13525
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
Published 2020-01-01“…In our leakage-resilient GID-scheme, the verifier believes the validity of qualified group members and tolerates l bits of adversarial leakage in the distribution protocol, whereas for unqualified group members, the verifier cannot believe their valid identifications in the proof protocol.…”
Get full text
Article -
13526
A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data
Published 2021-01-01“…The security of the new system depends on the issue of analyzing huge integers, which reach 2048 bits, to their prime factors, which are considered almost impossible or unsolvable. …”
Get full text
Article -
13527
Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems
Published 2017-02-01“…In this article, we generalize Trivium to the Trivium-Model algorithm and highlight that security is mainly determined by the internal state bits and the number of nonlinear terms. We propose principles for choosing parameters and generating better parameters that are feasible for low-cost radio frequency identification tags in distributed sensor networks. …”
Get full text
Article -
13528
An Evolved Wavelet Library Based on Genetic Algorithm
Published 2014-01-01“…Many conventional image compression algorithms use wavelet transform which can significantly reduce the number of bits needed to represent a pixel and the process of quantization and thresholding further increases the compression. …”
Get full text
Article -
13529
A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature
Published 2016-01-01“…This paper proposed a quantitative risk evaluation model for network security based on body temperature (QREM-BT), which refers to the mechanism of biological immune system and the imbalance of immune system which can result in body temperature changes, firstly, through the r-contiguous bits nonconstant matching rate algorithm to improve the detection quality of detector and reduce missing rate or false detection rate. …”
Get full text
Article -
13530
Asynchronous Realization of Algebraic Integer-Based 2D DCT Using Achronix Speedster SPD60 FPGA
Published 2013-01-01“…Recently proposed algebraic-integer-(AI-) based discrete cosine transform (DCT) algorithms are analyzed in the presence of quantization, using the High Efficiency Video Coding (HEVC) standard. …”
Get full text
Article -
13531
Configuration of the Operation Modes for a Scintillating Fiber Sub-Detector in LHCb Experiment
Published 2018-05-01“…It will emphasize the Scintillating Fibers detector (SciFi), one of LHCb's future sub-detectors in charge of the trace pattern recognition based on the hits occurred on this sub-detector and the recording of significant events in the data transmission. …”
Get full text
Article -
13532
Design Time Optimization for Hardware Watermarking Protection of HDL Designs
Published 2015-01-01“…HDL-level design offers important advantages for the application of watermarking to IP cores, but its complexity also requires tools automating these watermarking algorithms. …”
Get full text
Article -
13533
Comparative Analysis of Drilling Behaviour of Synthetic and Natural Fiber-Based Composites
Published 2021-01-01“…The axial force generated by candlestick drill is minimal compared to the other drill bits. The following may be responsible for lower thrust force: (1) the axial force distributes circumferential of the cutting tool instead of focusing at the center and (2) the interfacial adhesiveness between the matrix and the fiber is higher. …”
Get full text
Article -
13534
A comparison of the parameters of the chromatographic separation of the mixture of dyes obtained by caLC on the adsorbents type RP-8 and RP-18
Published 2017-09-01“…The aim of the presented research was to compare the chromatographic separation process, a mixture of food dyes obtained in capillary action liquid chromatography (caLC) columns packed with adsorbent type RP-8 and RP-18 and using as the eluent: methanol-water-acetic acid (4:5:1, v/v). The obtained retention data were compared with separation in caLC columns with different internal diameters, different distance of migration and the different mode of development the chromatograms.…”
Get full text
Article -
13535
Impacto de las enfermedades foliares sobre variables fisiológicas determinantes del rendimiento del girasol ante diferentes situaciones de cultivo
Published 2018-01-01“…Se midió el área foliar, la incidencia y severidad de las enfermedades, el rendimiento, el peso y número de aquenios y el contenido de aceite. MNT fue la enfermedad de mayor prevalencia e incidencia (19 a 81%). …”
Get full text
Article -
13536
Oral delivery of bovine tuberculosis vaccine to free-ranging white-tailed deer
Published 2025-02-01Subjects: “…BCG…”
Get full text
Article -
13537
-
13538
Phytochemical Constituents, Antimicrobial activities and Isolation of Eupatorin from the Seed Extract of <i>L. inermis</i> LINN
Published 2020-01-01“…The MIC/MBC measurement against those microbes was found to be between 3.125 mg/ml to 50 mg/ml. The ethyl acetate extract was purified using column chromatography and eluted with ethyl acetate and ethanol solvents in various ratios. …”
Get full text
Article -
13539
Effect of fecal microbiota transplantation on ulcerative colitis model in rats: The gut–brain axis
Published 2025-02-01“…Conclusions: FMT suppressed acetic acid-induced colitis by inhibiting the TLR4/MYD88/NF-kB signaling pathway. …”
Get full text
Article -
13540
Allelopathic and auto-toxic effects of aqueous extracts of Codonopsis pilosula root secretions.
Published 2025-01-01“…Three primary allelopathic compounds-acetic acid, hexamethyl cyclotrisiloxane, and methoxybenzene oxime were isolated and identified in the aqueous extracts. …”
Get full text
Article