Showing 261 - 280 results of 185,616 for search 'IT~', query time: 0.99s Refine Results
  1. 261
  2. 262

    Discussion for H-Matrices and It’s Application by Guichun Han, Huishuang Gao, Haitao Yang

    Published 2014-01-01
    “…So the criteria for nonsingular H-matrices are expanded and their application on neural network system is given. …”
    Get full text
    Article
  3. 263

    Rotavirus in Calves and Its Zoonotic Importance by Umer Seid Geletu, Munera Ahmednur Usmael, Fufa Dawo Bari

    Published 2021-01-01
    “…The most commonly detected strains in both human and animals are G2, G3, G4, and G9, P [6]. Therefore, this review was made to get overview epidemiology status and zoonotic importance of bovine rotavirus.…”
    Get full text
    Article
  4. 264

    Multivariate Macdonald Distribution and Its Properties by Daya K. Nagar, Edwin Zarrazola, Luz Estela Sánchez

    Published 2016-01-01
    “…We give multivariate generalization of Macdonald distribution and study several of its properties. …”
    Get full text
    Article
  5. 265
  6. 266

    The Ant Cerapachys Rufithorax and its Synonyms by William L. Brown

    Published 1955-01-01
    “…Psyche: A Journal of Entomology…”
    Get full text
    Article
  7. 267
  8. 268
  9. 269

    A trusted IoT architecture model by Ansheng YIN, Shijun ZHANG

    Published 2017-10-01
    “…The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.…”
    Get full text
    Article
  10. 270

    Internet and Its Contributions to Library Services by Yaşar Çelik

    Published 1995-06-01
    “…This paper examines the major Internet services such as email, telnet and ftp and describes various information discovery and retrieval tools such as gopher, WAIS, and WWW. …”
    Get full text
    Article
  11. 271

    Threat Life Cycle and Its Dynamics by Rudolf Urban, Šárka Hošková-Mayerová

    Published 2017-10-01
    “…Furthermore, it indicates that due to the changing environmental conditions, for example, there may also be changes in the evaluation of not only the threat dynamics as a whole, but also of its various phases. This approach, with an emphasis on exploring the dynamics of each phase, is first tested on a hypothetical example. …”
    Get full text
    Article
  12. 272

    Survey on differential privacy and its progress by Zhi-qiang GAO, Yu-tao WANG

    Published 2017-10-01
    “…With the arrival of the era of big data sharing,data privacy protection issues will be highlighted.Since its introduction in 2006,differential privacy technology has been widely researched in data mining and data publishing.In recent years,Google,Apple and other companies have introduced differential privacy technology into the latest products,and differential privacy technology has become the focus of academia and industry again.Firstly,the traditional centralized model of differential privacy was summarized,from the perspective of analysis of data mining and data released in the differential privacy way.Then the latest local differential privacy regarding data collection and data analysis based on the local model was described,involving crowdsourcing with random response technology,BloomFilter,statistical inference techniques.Finally,the main problems and solutions of differential privacy technology were summarized.…”
    Get full text
    Article
  13. 273

    MOTIVATING DELEGATION MODEL AND ITS RATIONALE by A. A. Dolgaya

    Published 2020-07-01
    “…The actualization of the employee’s personal effectiveness lies in his internal, inherent and characteristic motivational model only for him. …”
    Get full text
    Article
  14. 274

    RETRACTED: Technical progress and its issues by Bataeva Patimat, Valeev Sergey, Bagov Artur

    Published 2024-01-01
    “…BIO Web of Conferences…”
    Get full text
    Article
  15. 275

    The dengue fever and its explosive spread by Abedin Saghafipour, Ghobad Moradi

    Published 2024-12-01
    “…These factors include: 1-Global warming due to human activities and creating favorable living conditions and reproduction of Aedes mosquitoes. 2- Numerous seasonal rains that create temporary and suitable larval habitats and breeding places for Aedes mosquitoes. 3- The presence of numerous larval habitats for Aedes mosquitoes; They lay eggs anywhere there is stagnant water: in discarded used tires, in broken containers that hold water and septic tank valve pipes, and even in abandoned cans. 4-Unlike other mosquitoes that only bite once and feed once before laying eggs; Invasive Aedes mosquitoes, especially Ae. aegypti, have repeated bites daily, and multiple and repeated bites cause more transmission of dengue fever virus and its explosive spread. 5- Aedes mosquitoes infected with one of the dengue fever virus serotypes vertically transmit the virus to their next generation; That is, Aedes infected with the virus also lay infected eggs, and from the infected eggs, the infected adult mosquitoes eventually come out, which are infected with the virus from the beginning without having a blood meal from the infected human reservoir, and with their first blood meal, they get fever. …”
    Get full text
    Article
  16. 276

    Weighted Semiparameter Model and Its Application by Zhengqing Fu, Guolin Liu, Ke Zhao, Hua Guo

    Published 2014-01-01
    “…A weighted semiparameter estimate model is proposed. …”
    Get full text
    Article
  17. 277

    Periodontal Disease and its Relationship with Diabetes by Jennifer Dayana Cárdenas Velastegui, Danna Mabel Castro Freire, Leslie Fernanda Dávila Alemán, Oswaldo Miranda Rosero

    Published 2023-06-01
    “…The severity of periodontal disease is affected by the inflammatory response. Cells such as IL-1β, IL-6, and TNF-α are chronically and persistently elevated. …”
    Get full text
    Article
  18. 278

    Dystrophy of the Sense of Incomprehension and its Consequences by O. A. Donskikh

    Published 2021-02-01
    “…Высшее образование в России…”
    Get full text
    Article
  19. 279

    On 6G and wide-area IoT by Xiaohu YOU, Hao YIN, Hequan WU

    Published 2020-03-01
    Subjects: “…6G mobile communication…”
    Get full text
    Article
  20. 280