Suggested Topics within your search.
Suggested Topics within your search.
- History and criticism 7
- Politics and government 7
- Constitutional law 6
- History 6
- Law 6
- Methodology 6
- Economic conditions 5
- Mass media 5
- Swahili language 5
- English language 4
- Management 4
- Philosophy 4
- Research 4
- Study and teaching 4
- Women 4
- kiswahili 4
- kiswahili language 4
- Economic development 3
- Economic policy 3
- Evaluation 3
- Information technology 3
- Interpretation and construction 3
- Moral and ethical aspects 3
- Public administration 3
- Administration 2
- Agriculture 2
- Application software 2
- Appreciation 2
- Automobiles 2
- Children 2
-
3501
-
3502
Tag dynamic ownership transfer protocol for multi-owner with weights
Published 2017-04-01“…A dynamic ownership transfer protocol of RFID tag based on Lagrange algorithm was proposed to achieve the transfer for multi-owner with different weights.When the ownership of a tag changed,the agreement could recover the original secret key to verify the legitimacy of the owners,and use secret sharing algorithm to redistribute sub-key according to the new weights of the owners to make the security and flexibility of the ownership transfer improved.The simulation is carried out to show that it adapts to a low-cost RFID tag because the calculation and time consuming are low in the protocol.…”
Get full text
Article -
3503
A Survey on Reconfigurable Intelligent Surface for Physical Layer Security of Next-Generation Wireless Communications
Published 2024-01-01“…Unprecedented growth in wireless data traffic, and ever-increasing demand for highly secured, and low-latency wireless communication has motivated the research community to move towards sixth-generation (6G) technology, where networks can cater to the rising need for ubiquitous secure wireless connectivity. …”
Get full text
Article -
3504
Infantile Myofibroma Presenting as a Large Ulcerative Nodule in a Newborn
Published 2019-01-01“…While history, physical exam, and imaging can help diagnose some cases, a biopsy or excision is often needed to distinguish benign lesions from more concerning lesions.…”
Get full text
Article -
3505
A Method for Borehole Image Reverse Positioning and Restoration Based on Grayscale Characteristics
Published 2024-12-01Get full text
Article -
3506
RESEARCH ON RELIABILITY ASSESSMENT METHOD OF MECHANICAL SYSTEM CONSIDERING MULTIPLE FAILURE STATES
Published 2022-01-01“…Finally, the method is used to evaluate the reliability of the expansion system of the tunnel stacker, and it is verified that this method can accurately and effectively identify the weak links of the polymorphic system, and provide guidance for maintenance and diagnosis.…”
Get full text
Article -
3507
Dimension Spectrum for Sofic Systems
Published 2014-01-01“…We extend this method to nonnegative matrix and give a series of examples of the sofic-affine set on which we can compute the spectrum concretely.…”
Get full text
Article -
3508
Experimental Study on Compressive and Flexural Performances of Polypropylene Fiber-Reinforced Concrete
Published 2022-01-01“…Furthermore, the CFEC and CTI of PPFRC are both higher than those of PC, indicating that it has significant crack resistance and toughness.…”
Get full text
Article -
3509
Plate Size Effects in Gravelly Soil Based on In Situ Plate Load Tests and Finite Element Analysis
Published 2025-01-01“…Although variations in test plate diameter may alter the shape of the average contact stress–settlement curve, the overall pattern of change remains consistent. …”
Get full text
Article -
3510
Sparse Gene Coexpression Network Analysis Reveals EIF3J-AS1 as a Prognostic Marker for Breast Cancer
Published 2018-01-01“…Predictive and prognostic biomarkers facilitate the selection of treatment strategies that can improve the survival of patients. Accumulating evidence indicates that long noncoding RNAs (lncRNAs) play important roles in cancer progression, with diagnostic and prognostic potential. …”
Get full text
Article -
3511
Critical nodes selection based on trust evaluation in Ad Hoc networks
Published 2014-11-01“…There are some critical nodes in Ad Hoc networks,and the failure of these critical nodes can critically affect the performance of the network.For the aim of selecting the important and trusted critical nodes in Ad Hoc networks,the definition of critical nodes is given,meanwhile,a critical nodes selection algorithm based on trust evaluation is proposed.By using the node contraction,the importance degree of the node is calculated.Then combined with D-S evidence theory,the trust evaluation model of critical node is presented,which is used to obtain the objective trust of the node and to judge the credibility of the node.Finally,the critical nodes are selected by considering of the importance degree and the credibility of the node.Simulation results show that when those critical nodes are failure,selected by the proposed algorithm,the network performance is decreasing significantly.…”
Get full text
Article -
3512
Transient Pulse Test for Non-Darcy Flow Behaviors and Hydromechanical Coupling Effect of Fractured Limestone
Published 2020-01-01“…The relationship between hydraulic pressure difference and time can be fitted by quartic polynomial. The larger the confining pressure is, the more obvious the non-Darcy seepage effect of fractured rock seepage is. …”
Get full text
Article -
3513
Experimental investigation of gas seepage characteristics in coal seams under gas-water-stress function
Published 2025-01-01“…The research outcomes can establish a basis for optimizing gas recovery from coal seams.…”
Get full text
Article -
3514
Study on Recovery Strategy of Hearing Loss & SGN Regeneration Under Physical Regulation
Published 2025-02-01“…Abstract The World Health Organization (WHO) reports that by 2050, nearly 2.5 billion people are expected to have some degree of hearing loss (HL) and at least 700 million will need hearing rehabilitation. …”
Get full text
Article -
3515
Dynamic scheduling method of service function chain executors based on the mimic defense architecture
Published 2022-04-01Subjects: “…service function chain…”
Get full text
Article -
3516
Shear properties of jointed dual-pylon of the cable-stayed bridge with separated unequal-width decks under asymmetric load
Published 2025-01-01“…Moving load and longitudinal wind load have minimal impact on the nonlinear stability coefficient, and the dead load and lateral wind load primarily govern the failure of the dual-pylon connectivity node.…”
Get full text
Article -
3517
Low-Cost Lens Antenna Design for Microwave Moisture Detection
Published 2022-01-01“…The results show that in the frequency band of 5-6 GHz, the voltage standing-wave ratio (VSWR) of the antenna is less than 2, and the gain at 5.8 GHz reaches 16.2 dBi after installing the lens. …”
Get full text
Article -
3518
USP14 inhibition by degrasyn induces YAP1 degradation and suppresses the progression of radioresistant esophageal cancer
Published 2025-02-01“…Ubiquitin-specific peptidase 14 (USP14) is a novel deubiquitinase and can mediate cancer cells’ response to irradiation, although the underlying mechanism remains unclear, including in ESCA. …”
Get full text
Article -
3519
A study on the effect of blue light on kidney stone formation in rats via the brain-kidney axis
Published 2025-01-01“…However, in normal rats, blue light intervention did not cause significant changes in these indicators. In summary, this study indicates that under pathological conditions, blue light may promote the secretion of antidiuretic hormone in serum and enhance oxidative stress response in renal tissues by affecting the brain-kidney axis, thereby accelerating the formation of kidney stones in rats.…”
Get full text
Article -
3520
Reversed link between central pacific ENSO and Greenland–Barents sea ice
Published 2025-01-01“…The variation in wave patterns can largely be attributed to the sea surface temperature anomaly in the tropical Atlantic induced by CP ENSO. …”
Get full text
Article