Suggested Topics within your search.
Suggested Topics within your search.
- Business 1
-
301
Recovery of gold from refractory ore employing pressure oxidation
Published 2025-01-01Get full text
Article -
302
Preparation of Sheepskin Unhairing Extracts from Locally Available Plants: Cleaner Leather Processing
Published 2022-01-01Get full text
Article -
303
Reductive-sulfurizing smelting treatment of smelter slag for copper and cobalt recovery
Published 2018-01-01Get full text
Article -
304
-
305
The international leader and his moral code according to the theory of realism
Published 2020-05-01“…The more versatile the values, the greater the chance of peace, but because a realistic leader is characterized by untenable and selfish morality, which is neither lasting nor certain. …”
Get full text
Article -
306
-
307
-
308
Anonymous and authenticated routing protocol for mobile ad hoc networks
Published 2009-01-01“…Aimed at the anonymous of open environment of mobile ad hoc networks was not considered in the routing protocol of ARAN, and it was a low efficiency protocol in searching a routing.An new anonymous and authenticated routing protocol for mobile ad hoc networks(AARAN) was presented, It made use of hash function, signature and Hello message.The protocol can effectively ensure the anonymous of the networks, avoid launching a routing request repeat-edly, so it improves the efficiency, and the protocol can availably account for the harm which is caused by selfish nodes.…”
Get full text
Article -
309
-
310
Clinical and measurement variables affecting halitosis intensity following cysteine challenge test
Published 2025-02-01Get full text
Article -
311
Exploring the multidimensional nature of the psychopathy construct in social media context: Insights from Instagram
Published 2025-03-01“…To address this gap in the literature, the current study examined the relationships between multiple dimensions of the psychopathy construct, as measured by the Youth Psychopathic Traits Inventory – Short Version (YPI-S), and indices of cybercrime, cyber abuse, sadfishing, Instagram addiction, and Instagram activity metrics (daily time spent, frequency of sharing stories/posts, and selfie-sharing), as well as indices of successful online careers in the context of Instagram. …”
Get full text
Article -
312
-
313
Environment Parameters Control Based on Wireless Sensor Network in Livestock Buildings
Published 2016-05-01Get full text
Article -
314
Incentive mechanism enables efficient fog network
Published 2019-03-01“…In order to improve the resource utilization and service quality of the fog network,as well as ensure the reliability and security of heterogeneous fog nodes,a reasonable incentive mechanism was required.The introduction of incentive mechanism can effectively motivate the service enthusiasm of fog network equipment and reduce the malicious or selfish behavior of the equipment.Firstly,the research significance of the fog computing was proposed,and the characteristics as well as the application scenarios of fog networks were given.Secondly,the system architecture of the fog network was introduced.Then the incentive mechanism was integrated with the resource sensing technology and the task offloading technology in the fog network,and further examples were presented to show the important role of the incentive mechanism in the fog network.…”
Get full text
Article -
315
Control of the temperature regime of the process of bacterial oxidation on the basis of fuzzy logic
Published 2023-10-01Get full text
Article -
316
-
317
Trust evaluation routing protocol to enforce cooperation in mobile ad hoc networks
Published 2012-07-01“…Mobile ad hoc networks(MANET)were based on the assumption that all participants cooperate and forward packets for others.Unfortunately,selfish nodes might be not willing to cooperate and refuse to forward packets.A trust evaluation routing protocol based on DSR (TDSR) was proposed to enforce cooperation and encourage forwarding packets in MANET.The trust value was used to evaluate packet forwarding behaviors.The nodes with low packet forwarding rate were excluded by the node and path trust evaluation.These nodes must wait some time for recovery.Simulation results show that TDSR has obviously higher packet delivery ratio than DSR in face of non-cooperated nodes at the expense of the performance degradation on the delay.…”
Get full text
Article -
318
Potential Interfering Substances and Potentiometric Antioxidant Activity Tests in Food Systems
Published 2023-09-01Get full text
Article -
319
Oral-malodor measurement and intention to quit smoking in men: A before–after study
Published 2023-07-01Get full text
Article -
320