Suggested Topics within your search.
Suggested Topics within your search.
- History 38
- Social conditions 23
- Politics and government 21
- Economic conditions 16
- Women 15
- methods 15
- Law reports, digests, etc 13
- Health 12
- Management 12
- Study and teaching 11
- Economic development 10
- Biochemistry 9
- Civilization 9
- English language 9
- Mass media 9
- Physical fitness 9
- Research 9
- Anesthesia 8
- Economic policy 8
- History and criticism 8
- Juvenile literature 8
- Education 7
- Nursing 7
- Philosophy 7
- Psychology 7
- Evaluation 6
- Obstetrics 6
- Orthopedics 6
- Business 5
- Criminal law 5
-
261
The Sentence as the Concept and its Role in Communication
Published 2011-08-01Get full text
Article -
262
Discussion for H-Matrices and It’s Application
Published 2014-01-01“…So the criteria for nonsingular H-matrices are expanded and their application on neural network system is given. …”
Get full text
Article -
263
Rotavirus in Calves and Its Zoonotic Importance
Published 2021-01-01“…The most commonly detected strains in both human and animals are G2, G3, G4, and G9, P [6]. Therefore, this review was made to get overview epidemiology status and zoonotic importance of bovine rotavirus.…”
Get full text
Article -
264
Multivariate Macdonald Distribution and Its Properties
Published 2016-01-01“…We give multivariate generalization of Macdonald distribution and study several of its properties. …”
Get full text
Article -
265
-
266
The Ant Cerapachys Rufithorax and its Synonyms
Published 1955-01-01“…Psyche: A Journal of Entomology…”
Get full text
Article -
267
-
268
-
269
A trusted IoT architecture model
Published 2017-10-01“…The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.…”
Get full text
Article -
270
Internet and Its Contributions to Library Services
Published 1995-06-01“…This paper examines the major Internet services such as email, telnet and ftp and describes various information discovery and retrieval tools such as gopher, WAIS, and WWW. …”
Get full text
Article -
271
Threat Life Cycle and Its Dynamics
Published 2017-10-01“…Furthermore, it indicates that due to the changing environmental conditions, for example, there may also be changes in the evaluation of not only the threat dynamics as a whole, but also of its various phases. This approach, with an emphasis on exploring the dynamics of each phase, is first tested on a hypothetical example. …”
Get full text
Article -
272
Survey on differential privacy and its progress
Published 2017-10-01“…With the arrival of the era of big data sharing,data privacy protection issues will be highlighted.Since its introduction in 2006,differential privacy technology has been widely researched in data mining and data publishing.In recent years,Google,Apple and other companies have introduced differential privacy technology into the latest products,and differential privacy technology has become the focus of academia and industry again.Firstly,the traditional centralized model of differential privacy was summarized,from the perspective of analysis of data mining and data released in the differential privacy way.Then the latest local differential privacy regarding data collection and data analysis based on the local model was described,involving crowdsourcing with random response technology,BloomFilter,statistical inference techniques.Finally,the main problems and solutions of differential privacy technology were summarized.…”
Get full text
Article -
273
MOTIVATING DELEGATION MODEL AND ITS RATIONALE
Published 2020-07-01“…The actualization of the employee’s personal effectiveness lies in his internal, inherent and characteristic motivational model only for him. …”
Get full text
Article -
274
RETRACTED: Technical progress and its issues
Published 2024-01-01“…BIO Web of Conferences…”
Get full text
Article -
275
The dengue fever and its explosive spread
Published 2024-12-01“…These factors include: 1-Global warming due to human activities and creating favorable living conditions and reproduction of Aedes mosquitoes. 2- Numerous seasonal rains that create temporary and suitable larval habitats and breeding places for Aedes mosquitoes. 3- The presence of numerous larval habitats for Aedes mosquitoes; They lay eggs anywhere there is stagnant water: in discarded used tires, in broken containers that hold water and septic tank valve pipes, and even in abandoned cans. 4-Unlike other mosquitoes that only bite once and feed once before laying eggs; Invasive Aedes mosquitoes, especially Ae. aegypti, have repeated bites daily, and multiple and repeated bites cause more transmission of dengue fever virus and its explosive spread. 5- Aedes mosquitoes infected with one of the dengue fever virus serotypes vertically transmit the virus to their next generation; That is, Aedes infected with the virus also lay infected eggs, and from the infected eggs, the infected adult mosquitoes eventually come out, which are infected with the virus from the beginning without having a blood meal from the infected human reservoir, and with their first blood meal, they get fever. …”
Get full text
Article -
276
Weighted Semiparameter Model and Its Application
Published 2014-01-01“…A weighted semiparameter estimate model is proposed. …”
Get full text
Article -
277
Periodontal Disease and its Relationship with Diabetes
Published 2023-06-01“…The severity of periodontal disease is affected by the inflammatory response. Cells such as IL-1β, IL-6, and TNF-α are chronically and persistently elevated. …”
Get full text
Article -
278
Dystrophy of the Sense of Incomprehension and its Consequences
Published 2021-02-01“…Высшее образование в России…”
Get full text
Article -
279
On 6G and wide-area IoT
Published 2020-03-01Subjects: “…6G mobile communication…”
Get full text
Article -
280