CCA: : An immunopharmacological profile

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?

In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features may be achieved by multiple encrypting a message, such as the key-insulated cryptosystems and anonymous channels. Intuitively, a multiple encryption should remain “secure”, whenever there is one component cipher unbreak...

متن کامل

Immunopharmacological activity of saponin from Terminalia arjuna and Prosopis spicigera

The aim of the present work was to examine the immunopharmacological (anti-microbial and anti-inflammatory) effect of saponin on human peripheral blood mononuclear cells (PBMC) that are isolated as well as purified from infected (virally) and non-infected (normal) human whole blood samples. However, there is little information available concerning the effect of crude saponin on human PBMC in ca...

متن کامل

An Efficient Earth System Simulation Framework Based on Cca

Muti-physics coupling technologies could achieve a more real simulation for Earth system. The complexity of such simulation is a difficult problem. This paper presents an efficient Earth system simulation framework based on CCA (Common Component Architecture) which is applied in large scale scientific computing put forward recently by America. Based on such component schema, this framework coul...

متن کامل

Retrieving Keyword’s to an Image Query using Kernel CCA

In this paper we propose an approach to automatically annotate query images with keywords. We use kernel Canonical Correlation Analysis to learn a semantic representation between images and their associated documents. The semantic space provides a common representation and enables a comparison between the documents and images. This representation is then used in the creation of new document, co...

متن کامل

Lecture 14 - CCA Security

The OAEP encryption scheme was introduced by Bellare and Rogaway at Eurocrypt ’94. It converts any trapdoor permutation scheme into a public-key encryption scheme. OAEP is widely believed to provide resistance against adaptive chosen ciphertext attack. The main justification for this belief is a supposed proof of security in the random oracle model, assuming the underlying trapdoor permutation ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ensho

سال: 1981

ISSN: 0389-4290,1884-4006

DOI: 10.2492/jsir1981.1.2_281