نتایج جستجو برای: namely identity

تعداد نتایج: 280440  

2017
Mohsin Khan Valtteri Niemi

Subscription privacy of a user has been a historical concern with all the previous generation mobile networks, namely, GSM, UMTS, and LTE. While a little improvement have been achieved in securing the privacy of the long-term identity of a subscriber, the so called IMSI catchers are still in existence even in the LTE and advanced LTE networks. Proposals have been published to tackle this proble...

2000
ARRIGO BONISOLI bonisoli

All known finite sharply 4-transitive permutation sets containing the identity are groups, namely S4, S5, A6 and the Mathieu group of degree 11. We prove that a sharply 4-transitive permutation set on 11 elements containing the identity must necessarily be the Mathieu group of degree 11. The proof uses direct counting arguments. It is based on a combinatorial property of the involutions in the ...

Journal: :Twin research : the official journal of the International Society for Twin Studies 2004
Syuichi Ooki Akio Asaka

The present study deals with the determination of zygosity in twins of childhood age by simple questionnaire. The subjects were 224 twin pairs and their mothers, consisting of 159 monozygotic and 65 same-sex dizygotic pairs, identified by genetic markers including DNA samples. Mothers of twins responded to 19 questionnaire items dealing with twin similarity in 16 items about physical features a...

Journal: :CoRR 2012
Paridhi Jain Ponnurangam Kumaraguru

An online user joins multiple social networks in order to enjoy different services. On each joined social network, she creates an identity and constitutes its three major dimensions namely profile, content and connection network. She largely governs her identity formulation on any social network and therefore can manipulate multiple aspects of it. With no global identifier to mark her presence ...

Journal: :Acta virologica 2014
B Babu V Hegde

Dasheen mosaic virus (DsMV) infecting three major edible aroids namely Amorphophallus paeoniifolius, Colocasia esculenta, and Xanthosoma sagittifolium cultivated in India was characterized. Infected plants showing typical DsMV symptoms were subjected to reverse transcription-polymerase chain reaction, and an amplification of a 963 bp fragment which encoded the coat protein (CP) gene was obtaine...

2015
Junhong Min Deniz Dalman

Higher education has never truly recognized the importance of garnering the resources of alumni by expending university efforts in developing, controlling, and maintaining relationships with alumni. The purpose of this research is to tackle the long-term relationship marketing question. Drawing on the social marketing and relationship marketing literature, the authors propose and empirically te...

Journal: :Journal of advanced nursing 2012
Jacinta Kelly Gerard M Fealy Roger Watson

AIM This article is a report on a descriptive study of nursing identity as constructed in the Web 2.0 site YouTube. BACKGROUND Public images of the nurse carry stereotypes that rely on the taken for granted gender category of the nurse as woman. Nursing images represent a form of public discourse that has the capacity to construct nursing identity. METHODS Critical discourse analysis was us...

2013
Somindu C. Ramanna Palash Sarkar

We present a new hierarchical identity based encryption (HIBE) scheme with constant-size ciphertext that can be implemented using the most efficient bilinear pairings, namely, Type-3 pairings. In addition to being fully secure, our scheme is anonymous. The HIBE is obtained by extending an asymmetric pairing based IBE scheme due to Lewko and Waters. The extension uses the approach of Boneh-Boyen...

2005
Joonsang Baek Reihaneh Safavi-Naini Willy Susilo

“Certificateless Public Key Cryptography” has very appealing features, namely it does not require any public key certification (cf. traditional Public Key Cryptography) nor having key escrow problem (cf. Identity-Based Cryptography). Unfortunately, construction of Certificateless Public Key Encryption (CLPKE) schemes has so far depended on the use of Identity-Based Encryption, which results in ...

Journal: :Journal of Logic, Language and Information 2012
Atle Grønn Kjell Johan Sæbø

Indefinites face competition at two levels: Presupposition and content. The antipresupposition hypothesis predicts that they signal the opposite of familiarity, or uniqueness, namely, novelty, or non-uniqueness. At the level of descriptive content, they are pressured from two sides: definites expressing identity and another phrases expressing difference, and Gricean reasoning predicts that inde...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید