I am doing my phd in parapsychology, I would like to know any authenticated questioners regarding this.
IYH dear Yadlapati Sesha Sai
Try here https://parapsych.org/
What is Differential-Fed in microstrip patch antenna ? How it is design in CST studio? What is simulation process and procedure to do Differential-Fed in CST studio ?
08 July 2024 7,464 1 View
How to know the TM/TE modes in antenna design in CST studio? Example: TM01 ,TM02 ,TM10, TM12, TM30 like this... how can identify the antenna is operate the above said mode? can any one explain...
08 July 2024 6,609 2 View
what is co-polarization and cross polarization? How can plot it from CST studio? what are steps and process for find out co-polarization and cross polarization from CST studio?
08 July 2024 7,869 1 View
Context In the realm of cybersecurity, Transport Layer Security (TLS) is widely used to secure communications over a computer network. Despite its robust encryption mechanisms, TLS is still...
19 June 2024 6,595 3 View
Hi , I am facing difficulty in simulating MFMIS NC FET. Kindly help. How to define buried metal in Sentaurus TCAD?
27 May 2024 3,208 0 View
What is full wave simulation in antenna ? How to simulate in CST Studio software? Can anybody explain.
20 May 2024 5,224 3 View
Can anyone explain The overall size of the proposed antenna is only 1.34λ0 × 1.32λ0 × 0.014λ0.? What does it Mean?
20 May 2024 9,177 4 View
I want add a reflector in microstrip antenna in CST studio ? can any one suggest the procedure?
14 May 2024 3,899 2 View
Dear friends, I am looking to develop a new project for the applications of displays using float glass. How and what process is needed to develop such flat panel displays what are the ideas and...
09 May 2024 3,233 0 View
Can anyone explain how to plot Realized gain vs Frequency for individual port? How to plot directivity vs d/λ?
03 May 2024 4,380 3 View
In quantum cryptographic protocols, participants typically share both a quantum channel and a classical authenticated channel. Authenticated channels ensure that messages come from legitimate...
22 June 2024 7,074 3 View
I have isolated granulosa cells from mice ovary using puncture method. Cells are healthy and growing in DMEM. Their morphology is same as granulosa cells. However I would like to use a molecular...
12 May 2024 3,890 3 View
could i please get an example Use case diagram for fingerprint authentication in a mobile banking app?
08 May 2024 8,062 1 View
The recognition process of all types of biometrics relies on the probabilistic judgment of variable physical and / or behavioral features of human beings. However, an authentication system...
16 February 2024 3,773 5 View
Also, I would like to know how can I proceed with learning the usage of Proverif2.0, RoM and BAN Logic for a particular proposed authentication scheme.
09 February 2024 9,762 3 View
I'm interested in understanding the practical implementation of authentication and authorization using .NET Identity, specifically in the context of accommodating individual user schedules. If...
17 December 2023 1,421 3 View
Upto my review till now on this area i have categorized papers Authentication protocol's for HIS Cyber Threat Intelligence IoT security Information Security Management
26 October 2023 1,422 3 View
Where can i find pesudo implementation for cloud auditing mechanism proposed in "Enabling Parity Authenticator based public auditing with protection of a valid user revocation in cloud". I am...
04 October 2023 2,173 2 View
provide any suggestions from studies to support this question
28 August 2023 9,295 1 View
If yes, would you please provide examples from literature.
04 August 2023 9,558 11 View