Results 101 to 110 of about 3,062,704 (315)

Real-time polymerase chain reaction for identification of dog meat in adulterated beef meatball using specific primer targeting on cytochrome-b for halal authentication

open access: yes, 2020
This research aimed to validate real-time polymerase chain reaction using specific primer targeting on cytochrome-b 33 (cyt-b 33). The primer cyt-b 33 could specifically amplify dog meat DNA and method could detect 0.5 pg dog meat DNA in meatball ...
A. Rohman   +6 more
semanticscholar   +1 more source

Hierarchical Superposition Framework Reveals the Complex Effects of Natural Medicine Formulas

open access: yesAdvanced Intelligent Systems, EarlyView.
A novel hierarchical superposition pharmacological model incorporates the principle of hierarchical structures from physics to simulate the spatiotemporal dynamics of drug combinations, to elucidate the universal law underlying drug combination effects. By modeling cross‐level causal transmission and attenuation, it advances beyond traditional additive
Weifeng Liang   +3 more
wiley   +1 more source

Precision planter monitoring system based on mobile communication network

open access: yesIET Networks, EarlyView., 2022
Abstract Sowing is an important link in agricultural production and the basis for ensuring high yields and bumper harvests. Agriculture requires precision plows with good performance and stable work. However, the seeding process is in a completely closed state, and the operator relies mainly on experience to judge the operating state and performance of
Bing Li, Jiyun Li
wiley   +1 more source

Using shifted conjugacy in braid-based cryptography

open access: yes, 2006
Conjugacy is not the only possible primitive for designing braid-based protocols. To illustrate this principle, we describe a Fiat--Shamir-style authentication protocol that be can be implemented using any binary operation that satisfies the left self ...
Dehornoy, Patrick
core   +1 more source

Aboriginal and Torres Strait Islander Perspectives in Drinking Water Policy: A Realist Review

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT Aboriginal and Torres Strait Islander cultures have a deep, enduring connection to water. However, since Australia's colonisation in 1788, water management has shifted, creating ongoing issues for these communities. Notwithstanding the universal recognition of safe drinking water as a human right, significant inequities persist, particularly ...
Margaret Apolima Fono   +8 more
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Application of public key infrastructure in telecom operators

open access: yesDianxin kexue, 2020
With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be ...
Congli WANG, Jinhua WANG, Weijia XUE
doaj   +2 more sources

Flexible Authentication in Vehicular Ad hoc Networks

open access: yes, 2010
A Vehicular Ad-Hoc Network (VANET) is a form of Mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed roadside equipment. The key operation in VANETs is the broadcast of messages.
Caballero-Gil, C.   +3 more
core   +1 more source

Arboreal Alterations: An Introduction to Culturally Modified Trees (CMTs) in Australia

open access: yesArchaeology in Oceania, EarlyView.
ABSTRACT Culturally modified trees (CMTs) were once ubiquitous throughout the Australian landscape but they have been significantly affected by tree‐clearing practices associated with pastoralism, residential expansion and forestry. These, in addition to effects of bushfires and floods have had a massive impact on the survival of both dead and living ...
Sue O'Connor   +3 more
wiley   +1 more source

Comments to the Federal Trade Commission on the CAN-SPAM Rule Review, 16 C.F.R. Part 316, Project No. R711010 [PDF]

open access: yes, 2017
These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316. The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect ...
Ford, Roger Allan
core   +1 more source

Home - About - Disclaimer - Privacy