-
181
-
182
-
183
-
184
-
185
-
186
-
187
Estimation of mangrove carbon stocks using unmanned aerial vehicle over coastal vegetation
Published 2024-07-01Get full text
Article -
188
Pressure Methods for Primary Hemorrhage Control: A Randomized Crossover Trial
Published 2019-02-01“…Las yemas de los dedos de 3 dígitos de la mano derecha, 3 dedos de la mano dominante con la mano opuesta aplicando contrapresión, o 3 dígitos de cada una de las dos manos encima de la otra. …”
Get full text
Article -
189
-
190
Investigation for Possible Association of the Topside and Bottomside Ionospheric Irregularities over the Midlatitude Ionosphere
Published 2025-01-01“…We analyzed SF events over the European midlatitude region from 2015 to 2017, over six Digisonde stations coinciding with Swarm satellite overpasses. …”
Get full text
Article -
191
-
192
Case Studies on the Day‐to‐Day Variability in the Occurrence of Post‐Sunset Equatorial Spread F
Published 2022-09-01“…This study presents the results of the occurrence of post‐sunset ESF using data obtained from the Lowell Digisonde at Ilorin, Nigeria (ILR; 4.68°E, 8.50°N; Dip latitude −1.25°), spanning May–September 2019. …”
Get full text
Article -
193
Research of power line communication based on independent component analysis
Published 2007-01-01“…According to channel characteristics of power line communication(PLC),a scheme of applying independent component analysis to PLC system was proposed.The system model was constructed by the transmission characteristic of power line.The experiment and simulation show that the weak signals can be extracted and decoded from the trans-mission signals accurately,so that the distance of transmission can be improved.The model requires less restriction con-ditions which makes the model versatile in engineering.…”
Get full text
Article -
194
Certificate integration management platform based on identity key
Published 2016-10-01“…Asymmetric key cryptosystem plays an significant role in the field of information security.Compared with tra-ditional public key cryptosystem,the public key crypto system based on identity simplifies certificate management and reduces system communication and storage cost.A management platform and its unique merits were introduced after analyzing the current security schemes and comparing their various advantages and defects.According to the analysis of technical principles and functions,this product has a promising future.…”
Get full text
Article -
195
TÜRKİYE CUMHURİYETİ’NİN İLK ON BEŞ YILINDA VE SON ON BEŞ YILDA EĞİTİM PROGRAMLARI ALANINDA YAŞANAN SORUNLAR: KARŞILAŞTIRMALI BİR ANALİZ - CURRICULAR ISSUES IN THE FIRST 15 YEARS A...
Published 2017-09-01“…Araştırma sonucunda, eğitim programları alanında Cumhuriyet’inilk yıllarında karşılaşılan bazı sorunların çalışılan zaman dilimine deksüregeldiği, bu sorunlara ilave olarak yeni sorunlar baş gösterdiği ortayaçıkmıştır.…”
Get full text
Article -
196
MODEL OF SYMBIOTIC INFORMAL BUSINESS NETWORK BASED ON SERVICES OF FUNCTIONALLY DEPENDENT BUSINESS UNITS
Published 2018-01-01“…The research findings might be helpful to management and economics experts dealing with the problems of increasing the eficiency in modern con-ditions for researching theoretical and practical management.…”
Get full text
Article -
197
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01“…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
Get full text
Article -
198
Secure OFDM transmission scheme based on two-stage chaos mapping
Published 2016-07-01“…The eavesdropper cannot estimate the mes-sage from statistic characteristics of received signals, which guarantees the communication security. Compared with tra-ditional methods like advanced encryption standard, randomization of MIMO transmission coefficients, the scheme shows favorable computation security.…”
Get full text
Article -
199
Research on OLE object vulnerability analysis for RTF file
Published 2016-01-01“…In order to deal with the problem of OLE parsing vulnerability for RTF documents, a kind of vulnerability analysis method based on data block analysis and characterization data construction was proposed. The trigger con-ditions of OLE object vulnerability by reverse engineering technique were analyzed. …”
Get full text
Article -
200
Analysis of national BIM implementation strategies, for the creation of a reference frame-work for the implementation of BIM in Mexico.
Published 2023-10-01“…The research concluded that the public and private sectors must create the con-ditions to promote implementing BIM, by creating criteria and standards related to the man-agement and delivery of the information in the projects, to successfully take advantage of this approach. …”
Get full text
Article