14,525 research outputs found

    Power politics in Korea and its impact on Korean foreign and domestic affairs, 1882-1907 /

    Get PDF

    MATH 211-017: Calculus III A

    Get PDF

    MATH 111-001: Calculus I

    Get PDF

    MATH 111-005: Calculus I

    Get PDF

    A formally verified decentralized key management architecture for wireless sensor networks

    Get PDF
    We present a decentralized key management architecture for wireless sensor networks, covering the aspects of key deployment, key refreshment and key establishment. Our architecture is based on a clear set of assumptions and guidelines. Balance between security and energy consumption is achieved by partitioning a system into two interoperable security realms: the supervised realm trades off simplicity and resources for higher security whereas in the unsupervised realm the vice versa is true. Key deployment uses minimal key storage while key refreshment is based on the well-studied scheme of Abdalla et al. The keying protocols involved use only symmetric cryptography and have all been verified with our constraint solving-based protocol verification tool CoProVe

    Fumigant activity of plant essential oil from Armoracia rusticana (L.) on Plodia interpunctella (Lepidoptera: Pyralidae) and Sitophilus zeamais (Coleoptera: Curculionidae)

    Get PDF
    The fumigant toxicity of essential oil from horseradish plant, Armoracia rusticana (L.), was assessed against Plodia interpunctella (HĆ¼bner) and Sitophilus zeamais Motschulsky. A. rusticana oil was active against different life stages of P. interpunctella and adults of S. zeamais. The LC50 value for adults was the lowest and that of pupa was the highest. The major compound found by gas chromatography-mass spectrometry was allyl isothiocyanate (97.81%). These results indicate that it may be possible to achieve toxicity levels similar to those of standard chemical fumigants through the applications of essential oils from A. rusticana.Key word: Plant essential oil, Plodia interpunctella, Sitophilus zeamais, fumigant activity, allyl isothiocyanate

    Count three for wear able computers

    Get PDF
    This paper is a postprint of a paper submitted to and accepted for publication in the Proceedings of the IEE Eurowearable 2003 Conference, and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library. A revised version of this paper was also published in Electronics Systems and Software, also subject to Institution of Engineering and Technology Copyright. The copy of record is also available at the IET Digital Library.A description of 'ubiquitous computer' is presented. Ubiquitous computers imply portable computers embedded into everyday objects, which would replace personal computers. Ubiquitous computers can be mapped into a three-tier scheme, differentiated by processor performance and flexibility of function. The power consumption of mobile devices is one of the most important design considerations. The size of a wearable system is often a design limitation

    Gastrulation in Parhyale hawaiensis: How do they do it?

    Get PDF

    Marketing Strategy: A Tool for Library and Information Services Delivery by Academic Libraries in Southwest Nigeria.

    Get PDF
    Adoption of marketing concept into information oriented organizations such as academic libraries has becomeĀ imperative especially with the proliferation of information technology where libraries are no longer seen as theĀ sole custodian of knowledge. This study therefore aimed at investigating the need for marketing strategy as toolĀ for library and information services delivery by academic libraries using the various technology driven facilities.Ā The survey research design was adopted for the study. Stratified sampling technique was used to select 6Ā libraries from federal, state and private owned universities in South Western Nigeria. Total enumerationĀ technique was used in selecting the sample size consisting of 148 librarians and library officers in theĀ institutions. Data were gathered using questionnaire and the findings revealed that face to face approach and useĀ of the notice boards are the most common methods used in these libraries. Though some marketing strategiesĀ are already in use, services like indexing and abstracting which is even an ancient strategy is giving way for newĀ technologies. Likewise, database searching, network and rich site summary, and email alerts which are theĀ commonest of all are yet to be fully embraced. It was revealed that adopting marketing strategies in serviceĀ delivery has enhanced the image of these libraries and has boosted library professionalsā€™ self actualization.Ā However, challenges such as inadequate skills and lack of funds among others constitute threats to effective useĀ of marketing strategies in library service delivery
    • ā€¦
    corecore