I am doing my phd in parapsychology, I would like to know any authenticated questioners regarding this.
IYH dear Yadlapati Sesha Sai
Try here https://parapsych.org/
During performing CV of a GCE or modified GCE, we rise the potential in the first half of the cycle and reduce it in reverse half. During the first half, what is the nature of charge on GCE or...
25 February 2021 7,994 3 View
Hi all I am working on colon-targeted drug delivery for which I kept mice fasting for 6h using fasting grills during scotophase (dark period). I observed liquid fecal content in the cecum and...
23 February 2021 7,701 2 View
I am working on FTC for handling sensor faults in the system. I have read about observer-based FTC schemes which use error threshold-based logic between the states and estimated states. If a...
10 January 2021 5,771 2 View
In the DSC conducted for A and B (image provided). B is a derivative of A. Can I conclude that the porosity of composite B is more than A, Since the heat flow is decreasing with increase in...
26 December 2020 9,104 3 View
Nowadays, we are encountering with screen addiction in children especially during lockdown. I want to know any guidelines for screen control?
24 December 2020 7,194 3 View
I want to know whether a luenberger observer or a modified form of it be effective for estimating the states of a system of the following forms: 1. x_dot = f(x,u,d); y = x 2. x_dot = f(x,u); y =...
20 December 2020 1,392 4 View
Will it be helpful to know the nature of stabilizers used in synthesis of curcumin (if it has polymerized or not). Any specific measures to be followed to carry out these kind of experiments?
15 December 2020 2,283 4 View
I performed an opt calculation on molecule A and got A_opt. I performed a freq calculation on A_opt and got A_opt_freq I performed a polar calculation on A_opt and got A_opt_polar. The A_opt_freq...
09 December 2020 1,188 1 View
I am a beginner to this particular side of the theoretical analysis of a molecule using Gaussian and GaussView. What do the isovalues mean? What physical significance do they hold? How does one...
30 November 2020 1,648 3 View
Hello everyone, Is there any approach to generate a fixed no. of feature vectors from the sequential data(similar to time series data...) and also express the same sequential data in terms of the...
29 November 2020 5,508 3 View
Increasingly, more articles are being retracted because of duplicate or otherwise dubious Western blots. Consequently, journals are asking for original Western blots and authentication of...
23 February 2021 8,609 3 View
I am looking for a simulator to IOT device authentication based on blockchain without using physical device
01 February 2021 167 3 View
is it possible to use a MAC address of device as an authentication key for accessing a file? can this be implemented manually ? like if I want a specific device to access a file( i have no access...
22 July 2020 2,667 15 View
I am currently working on IoT authentication systematic literature review. Please suggest the IoT authentication protocol based on behavioural.
26 May 2020 1,238 5 View
Hi What are the best simulators/emulators that provides a wide support to simulate attacks on iot devices and protocols (BLE, MQTT, authentication, MITM, ddos, sybil ...) and that offers by the...
15 April 2020 355 2 View
I am doing research on comparative analysis of ID based cryptographic protocols like ElGamal, RSA, DSA etc. How can compare these protocols with the properties without doing any objective experiment?
13 March 2020 1,183 3 View
I am working on cooja simulator for the Authentication of iot node with blockchain. could you anyone share the authentication code of blockchain?
30 January 2020 4,452 7 View
cell line authentication, STR profiling, fragment analyser
22 December 2019 2,772 2 View
Authentication in IoT systems are vastly insecure. Mostly the problems lies on its open ended and probable untrustworthy nodes. Also, the need for a lighter authentication mechanism will always be...
09 December 2019 4,896 4 View
In the context of vertical industry, security demands could vary significantly among services. For instance, the mobile Internet of Things (IoT) devices requires lightweight security while...
08 October 2019 8,575 3 View