Showing 721 - 740 results of 185,616 for search 'IT~', query time: 1.04s Refine Results
  1. 721

    Determinantal Representations of the Core Inverse and Its Generalizations with Applications by Ivan I. Kyrchei

    Published 2019-01-01
    “…In this paper, we give the direct method to find of the core inverse and its generalizations that is based on their determinantal representations. …”
    Get full text
    Article
  2. 722

    A Torus-Chaotic System and Its Pseudorandom Properties by Jizhao Liu, Xiangzi Zhang, Qingchun Zhao, Jing Lian, Fangjun Huang, Yide Ma

    Published 2020-01-01
    “…Furthermore, the pseudorandom properties of output sequence are well studied and a random number generator algorithm is proposed, which has the potential of being used in several cyber security systems such as the verification code, secure QR code, and some secure communication protocols.…”
    Get full text
    Article
  3. 723

    An Improved Grey Model with Time Power and Its Application by Jianming Jiang, Caixia Liu, Yuanguo Yao, Yumu Lu, Wanli Xie, Chong Liu

    Published 2022-01-01
    “…Aimed to improve further the GM(1,1, tα) model, this paper introduces a new whitening equation with variable coefficient into the original whitening equation which extends applicable scope; as a result, an improved grey model with time power, namely, OGM(1,1, tα), is proposed. …”
    Get full text
    Article
  4. 724

    The Drug-Trafficking Economy and Its Dynamics in Latin America by Daniel Pontón C.

    Published 2013-09-01
    “…This article analyzes the behavior of drug-trafficking economy in Latin America during the last twelve years and its influence in the configuration of a new crime scenario in the region. …”
    Get full text
    Article
  5. 725
  6. 726

    Crop Growth Monitoring Through integration of WSN and IoT by Haoran yu

    Published 2022-09-01
    “…The emerging and revolutionary technology called Internet of Things (IoT), presenting the future of computing, communication, and network, has made a number of tough jobs easier with the help of Internet, sensor, and embedded systems. …”
    Get full text
    Article
  7. 727
  8. 728
  9. 729
  10. 730

    Decentralized credit system based on blockchain and its application by Mingsheng WANG, Heyang CAO, Peiyao LI

    Published 2019-08-01
    “…A decentralized credit system was proposed and its construction application was given.Decentralized credit system could be constructed by expanding the transaction structure of “digital currency commodity” based on block chain,expanding the function of consensus protocol and adding specific accounts.Also,the decentralized credit system was applied to the PKI enhancement and supervision system IKP so that IKP system did not need global fund in operation.Moreover,by introducing the hierarchical “virtual currency commodity” supply adjustment mechanism in the decentralized credit system to alleviate the difficulty of regulating the “virtual currency commodity” supply of “digital currency commodity” based on block chain,the precise “virtual currency commodity” supply regulation can be achieved.…”
    Get full text
    Article
  11. 731

    Melatonin and its physiological and therapeutic effects: A review by Stefanović Bojana V., Spasojević Nataša M., Ferizović Harisa N., Janković Milica D., Virijević Kristina M., Dronjak Slađana S.

    Published 2024-01-01
    “…Melatonin was discovered to be a direct free radical scavenger. By activating its receptors, it stimulates a wide range of signaling pathways. …”
    Get full text
    Article
  12. 732

    A Case of Hydrocele Stone with Its Composition Analysis by Masayoshi Zaitsu, Koji Mikami, Yuta Takeshima, Takumi Takeuchi

    Published 2010-01-01
    “…A 71-year-old man was diagnosed as stage D2 prostate cancer with his prostate-specific antigen 387 ng/ml. …”
    Get full text
    Article
  13. 733

    On 1-Absorbing Prime Hyperideal and Some of Its Generalizations by M. Anbarloei

    Published 2022-01-01
    “…For example, it is proved that if a strong C-hyperideal I of R is 1-absorbing prime that is not prime, then R is a local multiplicative hyperring. …”
    Get full text
    Article
  14. 734

    Essential Hypertension: An Approach to Its Etiology and Neurogenic Pathophysiology by Juan J. Bolívar

    Published 2013-01-01
    “…This review emphasizes that, from an evolutionary point of view, we are adapted to ingest and excrete <1g of sodium (2.5g of salt) per day and that essential hypertension develops when the kidneys become unable to excrete the amount of sodium ingested, unless blood pressure is increased. …”
    Get full text
    Article
  15. 735

    Urban Lead: Modeling Its Distribution and Effects on Children by Zhixiong Chen, Yi Ding, Andrew Getz, Bernard Lipat

    Published 2017-01-01
    “…We model the transportation of lead from the atmosphere and from the surface of the soil simultaneously at the macroscale and mesoscale to study its health effects on children in Jersey City, NJ. …”
    Get full text
    Article
  16. 736
  17. 737

    A review on the production of nanofertilizers and its application in agriculture by Birara Melku Ayenew, Neela Satheesh, Zemenu Birhan Zegeye, Desalegn Adisu Kassie

    Published 2025-01-01
    “…Nano fertilizers (NF) are nanomaterials (NM) that contrast significantly from their corresponding bulk materials. …”
    Get full text
    Article
  18. 738
  19. 739
  20. 740

    DMA-based key generation method for IoT scenario by Yinuo HAO, Zhou ZHONG, Xiaoli SUN, Liang JIN

    Published 2022-12-01
    “…Aiming at the problems of slow update frequency of channel key, low generation rate and limited node resources in the IoT scenario, a DMA-based physical layer key generation method was proposed, by using the agility and reconfigurability of DMA to improve the time variability and randomness of received signal.Firstly, DMA was used by the transmitter to randomly weight the signal and send it to the receiver, which could enhance the randomness of signals on the premise of ensuring the transparent reception of the signal.Then, the key from the received signal was extracted by the sender and receiver.By combining the rapid changeability and randomness of DMA, the randomness of signal source and the randomness of natural channel, a composite channel was constructed to improve the randomness of the key source.In addition, the channel estimation was transfered overhead from the terminal to the base station, which effectively reduced the overhead and delay of the communication system, and was suitable for IoT scenarios with asymmetric resources and lightweight equipment.Simulation results show that the proposed method can effectively improve the key generation rate in quasi-static scenarios, and the generated physical layer key has passed the NIST test.…”
    Get full text
    Article