Results 101 to 110 of about 3,062,704 (315)
This research aimed to validate real-time polymerase chain reaction using specific primer targeting on cytochrome-b 33 (cyt-b 33). The primer cyt-b 33 could specifically amplify dog meat DNA and method could detect 0.5 pg dog meat DNA in meatball ...
A. Rohman+6 more
semanticscholar +1 more source
Hierarchical Superposition Framework Reveals the Complex Effects of Natural Medicine Formulas
A novel hierarchical superposition pharmacological model incorporates the principle of hierarchical structures from physics to simulate the spatiotemporal dynamics of drug combinations, to elucidate the universal law underlying drug combination effects. By modeling cross‐level causal transmission and attenuation, it advances beyond traditional additive
Weifeng Liang+3 more
wiley +1 more source
Precision planter monitoring system based on mobile communication network
Abstract Sowing is an important link in agricultural production and the basis for ensuring high yields and bumper harvests. Agriculture requires precision plows with good performance and stable work. However, the seeding process is in a completely closed state, and the operator relies mainly on experience to judge the operating state and performance of
Bing Li, Jiyun Li
wiley +1 more source
Using shifted conjugacy in braid-based cryptography
Conjugacy is not the only possible primitive for designing braid-based protocols. To illustrate this principle, we describe a Fiat--Shamir-style authentication protocol that be can be implemented using any binary operation that satisfies the left self ...
Dehornoy, Patrick
core +1 more source
Aboriginal and Torres Strait Islander Perspectives in Drinking Water Policy: A Realist Review
ABSTRACT Aboriginal and Torres Strait Islander cultures have a deep, enduring connection to water. However, since Australia's colonisation in 1788, water management has shifted, creating ongoing issues for these communities. Notwithstanding the universal recognition of safe drinking water as a human right, significant inequities persist, particularly ...
Margaret Apolima Fono+8 more
wiley +1 more source
Distributed wireless network resource optimisation method based on mobile edge computing
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang+4 more
wiley +1 more source
Application of public key infrastructure in telecom operators
With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be ...
Congli WANG, Jinhua WANG, Weijia XUE
doaj +2 more sources
Flexible Authentication in Vehicular Ad hoc Networks
A Vehicular Ad-Hoc Network (VANET) is a form of Mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed roadside equipment. The key operation in VANETs is the broadcast of messages.
Caballero-Gil, C.+3 more
core +1 more source
Arboreal Alterations: An Introduction to Culturally Modified Trees (CMTs) in Australia
ABSTRACT Culturally modified trees (CMTs) were once ubiquitous throughout the Australian landscape but they have been significantly affected by tree‐clearing practices associated with pastoralism, residential expansion and forestry. These, in addition to effects of bushfires and floods have had a massive impact on the survival of both dead and living ...
Sue O'Connor+3 more
wiley +1 more source
Comments to the Federal Trade Commission on the CAN-SPAM Rule Review, 16 C.F.R. Part 316, Project No. R711010 [PDF]
These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316. The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect ...
Ford, Roger Allan
core +1 more source