-
521
A 10 C’s of social networking, interconnections and the impact on social networking
Published 2013“…All these 10 C's are one way or another are related as chain of activities with each other. For example, Community is one of the fundamental concepts of SNs, Connection, Communication and Collaboration are inherently embedded with groups. …”
Get full text
Proceeding Paper -
522
Forward and Inverse Kinematics Seamless Matching using Jacobian
Published 2013“…In this paper the problem of matching Forward Kinematics (FK) motion of a 3 Dimensional (3D) joint chain to the Inverse Kinematics (IK) movement and vice versa has been addressed. …”
Get full text
Article -
523
Ergodicity of nonlinear Markov operators on the finite dimensional space
Published 2016“…A nonlinear Markov chain is a discrete time stochastic process whose transition matrices may depend not only on the current state of the process but also on the current distribution of the process. …”
Get full text
Get full text
Get full text
Article -
524
Securing sensor reports in wireless sensor networks
Published 2007“…In this paper, we propose a scheme for securing the sensor reports in a wireless sensor network. We use one-way hash chain and pre-stored shared secret keys to provide data transmission security for the reports that travel from any source node to the base station. …”
Get full text
Book Chapter -
525
Influence of location attributes on home buyers’ purchase decision
Published 2018Get full text
Article -
526
-
527
Transducers-to-microcntroller interfaces-software solution approach
Published 2011“…Interfacing devices could also be a chain of electronic components providing a preliminary stage of processing or decision required for making a processor or plant to start and stop some onward control activities…”
Get full text
Book Chapter -
528
Computer modeling studies of apotirucallane triterpenes in solution
Published 2005“…We find that the inclusion of solvation effects of the polar side chain is crucial for the interpretation of NMR data. …”
Get full text
Article -
529
An undiagnosed non functioning retroperitoneum paraganglioma, complicating a gynaecological surgery; a case report
Published 2010“…Paragangliomas are uncommon tumors arising from the neuroendocrine elements (chief cells) of the paraganglia and symmetrically distributed along the aorta in close association with the sympathetic chain. Although functional tumors are easier to diagnose due to the clinical findings caused by excess secretion of catecholamines and an elevation of the urinary catecholamine levels, however the diagnosis of nonfunctioning paraganglioma of the retroperitoneum is diffi cult and only few cases have been made before exploratory laparotomy. …”
Get full text
Article -
530
Production of recombinant p53 protein by PCR-based site directed mutagenesis of plasmid DNA
Published 2010“…The purpose of the research is to produce human recombinant protein that mimic a specific mutation of the p53 gene by polymerase chain reaction (PCR) based site-directed mutagenesis of wild type p53 plasmid. …”
Get full text
Proceeding Paper -
531
A secure energy-efficient routing protocol for WSN
Published 2007“…We mainly focus on ensuring authenticity and confidentiality of the sensor reports by adopting one-way hash chain and pre-loaded shared secret keys. To achieve data freshness, there is an optional key refreshment mechanism in our protocol. …”
Get full text
Book Chapter -
532
Crystal Structure of gamma-Oxapentamidine complexed with d(CGCGAATTCGCG)2. the effects of drug structural change on DNA minor-groove recognition
Published 1994“…The y-oxapentamidine ligand interacts with the dodecamer by classic minor groove binding via interactions within the A+T-rich region of the minor groove. A chain of solvent molecules lies along the mouth of the minor groove on the outside of the bound ligand. …”
Article -
533
-
534
Lead time management in the garment sector of Bangladesh: an avenues for survival and growth
Published 2009“…The study has been concluded by the development of a new diagram of business process with the outcome that the other management process in the supply chain is an important factor rather than process management in the lead time minimization process. …”
Get full text
Article -
535
RFID reader architectures and applications
Published 2009“…In order to use radio frequency identification (RFID) for wireless communication and real world applications such as supply chain management, asset tracking systems, security and privacy systems, healthcare and commercial pplications, library management systems, geographic surface location identification and industrial tracking systems, the study of the nature and characteristics of the reader is an important factor. …”
Get full text
Article -
536
Primary plasma cell leukemia presented as progressive paraplegia: a case report
Published 2009“…Atypical cells expressed surface and cytoplasmic lambda light chain on immunochemical studies, surface CD45 and CD38. …”
Get full text
Article -
537
Two-person second-order games, part 2: restructuring operations to reach a win-win profile
Published 2009“…In Part 1 of the paper, using habitual domains theory and finite Markov chain theory, we have introduced a new model for describing the evolution of the states of mind of players over time, the two-person second-order game. …”
Get full text
Article -
538
The sensitive to freezing3 mutation of Arabidopsis thaliana is a cold-sensitive allele of homomeric acetyl-CoA carboxylase that results in cold-induced cuticle deficiencies
Published 2012“…Cuticle permeability was compromised in the sfr3 mutant when plants were grown in the cold but not in the warm.Wax deposition on the inflorescence stem of cold-grown sfr3 plants was inhibited and the long-chain components of their leaf cuticular wax were reduced compared with wild-type plants. …”
Get full text
Article -
539
Mixed-genotypes infections with hepatitis C virus in hemodialysis subjects.
Published 2012“…Reverse-transcription and polymerase chain reaction methods were performed using two different sets of primers, targeting the 5' untranslated region and nonstructural 5B region. …”
Get full text
Article -
540
Computer security self-efficacy factors influencing e-banking utilization and user satisfaction
Published 2012“…This study designed as a part of ongoing research aims to extend the Technology-to-Performance Chain (TPC) model by including the Computer Security Self-Efficacy (CSSE) construct, a strategy of model extension suggested by several researchers. …”
Get full text
Proceeding Paper