Since the disintegration of the Soviet Union, the new states of Central Asia have been obliged to adjust their institutions to new symbolic frontiers and to take into account the independence they achieved in 1991.Both universities and Academies of Sciences have been called to reconsider their research policies and to orient them in order to respon
Generalization Capability of Mixture Estimation Model for Peristaltic Continuous Mixing Conveyor
We propose herein a method for estimating the mixing state of the contents of a peristaltic continuous mixing conveyor simulating the intestine, developed for mixing and conveying powders and Drinkware Sets liquids.This study serves to improve a previously proposed method for estimating the mixing state using a logistic regression model with the pr
Beyond Pollination: Honey Bees (Apis mellifera) as Zootherapy Keystone Species
The keystone species concept is a useful ecological concept to explain how some species exert a strong force on their community structure; this paper strives to expand the definition to include species that are used in zootherapy, i.e., the use of animals for medicinal purposes.Honey bees (Apis mellifera) can be considered a zootherapy keystone spe
Whose sample is it anyway? Widespread misannotation of samples in transcriptomics studies [version 1; referees: 2 approved]
Concern about the reproducibility and reliability of biomedical research has been rising.An understudied issue is the prevalence of sample mislabeling, one impact of which would be invalid comparisons.We studied this issue in a corpus of human transcriptomics studies by comparing the provided annotations of sex to the expression levels of sex-speci
A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard.Therefore, MQTT must achieve efficient security.Nevertheless, the most significant drawback of the MQTT is its lack Stockings of protection mechanisms.Meanwhile, the existing approaches have added processing overhead to the devices and are still vulnera