-
1
TECHNOLOGy AND NAQSHBANDI SUFISM: AN EMPIRICAL ANALYSIS OF ISMAIL AGA AND iSKENDER PAŞA BRANCHES
Published 2016-02-01“…<p>ATECHNOLOGy AND NAQSHBANDI SUFISM: AN EMPIRICAL ANALYSIS OF ISMAIL AGA AND iSKENDER PAŞA BRANCHES</p>…”
Get full text
Article -
2
I normanni nel territorio dell’Albania del Sud. Il caso di Gurëzeza
Published 2019-01-01Get full text
Article -
3
-
4
-
5
-
6
-
7
Utilizing Structural Network Positions to Diversify People Recommendations on Twitter
Published 2022-01-01Get full text
Article -
8
ECMO in the Cardiac Catheterization Lab—Patient Selection Is Key
Published 2024-12-01Get full text
Article -
9
Extracorporeal Cardiopulmonary Resuscitation—Where Do We Currently Stand?
Published 2025-01-01Get full text
Article -
10
Le quartier épiscopal de Byllis (Albanie). Les campagnes de fouilles 2011-2012
Published 2013-12-01Get full text
Article -
11
Byllis (Albanie), campagne 2007 : le quartier épiscopal, la basilique E et les carrières
Published 2008-08-01Get full text
Article -
12
-
13
-
14
-
15
Helicobacter pylori antibacterial resistance patterns in Latvia: results from the Gistar pilot study
Published 2024-06-01Get full text
Article -
16
Optimization of multipath transmission path scheduling based on forward delay in vehicular heterogeneous network
Published 2020-11-01“…In order to solve the problem that the data packets were out of order at the receiving end in the multipath transmission,which greatly reduced the transmission performance,an optimization algorithm was proposed for multipath transmission path scheduling based on forward delay in the vehicle heterogeneous network.The main idea of the proposed algorithm was to schedule data packets through a concurrent path according to the forward delay and throughput difference estimated by the sender.A simulation experiment was carried out on NS-3.The simulation results show that compared with the previous algorithm,the proposed algorithm has better performance than other algorithms in reorder-buffer-occupancy density (RBD) and throughput.The problem of out-of-order data packets at the receiving end is significantly reduced,and the total system throughput and network utilization have been improved.…”
Get full text
Article -
17
Quantum public-key encryption protocol based on single-photon
Published 2014-11-01“…A quantum public-key encryption protocol based on single-photon was provided.Pseudo random sequence mapping to private keys to implement corresponding quantum operations and then obtaining quantum public-key to encode the plaintext was used.Employ the method of block classification to lower the requirement for storage capacity of the sender.A new quantum source as transmission carrier was introduced and simply encoding and decoding rules were designed based on the laws of quantum non-cloning and ciphertext indistinguishability.On the other hand,classical one-time pad technique is used to ensure the security of quantum key and plaintext in the transmission channel.At the same time,select different updating strategy of quantum public-key according to the results of error detection which can significantly reduce key consumption.Compared with the previous quantum public-key encryption based on entangled states and single-photon,there are no entangled states and decoyed particles are needed,so it is not only efficient to reduce the overhead of communication traffic between legitimate users,but also easier to carry out in practice.The analysis shows that the proposed scheme is secure.…”
Get full text
Article -
18