نتایج جستجو برای: enhancing biological control
تعداد نتایج: 1815061 فیلتر نتایج به سال:
Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhancing Technologies (PETs) should not only hide the identity of legitimate users but also provide means by which evidence of malicious activity can be gathered. This paper proposes a forensic investigation technique, which can be...
In the recent past we have witnessed the rapid spreading of biometric technologies for automatic people authentication, due to the several inherent advantages they offer over classic methods. Biometrics can be defined as the analysis of physiological or behavioral people characteristics for automatic recognition purposes. Biometric authentication relies on who a person is or what a person does,...
Wireless networks have become increasingly popular for the past few years, especially IEEE 802.11 as the most widespread wireless technology. This article proposes a new architecture for broadband 802.11 networks to support distributed multimedia applications. After discussing the differences between multimedia and traditional applications, we show how the 802.11b mechanism ensuring enhanced ro...
Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the utilisation of such technologies. The question arises if there is a market for Privacy Enhanced Technology. The answer is yes, however Privacy Enhancing Technology may not have been broadly known yet in order to make it p...
Security and privacy issues have become far more critical and complex in the Internet era. Balancing security enhancement and privacy protection remains a key challenge involving both technical and non-technical issues. It is crucial to restructure computer and software engineering curricula to familiarize students with the challenges and opportunities associated with the security and privacy i...
Biological interpretability is a key requirement for the output of microarray data analysis pipelines. The most used pipeline first identifies a gene signature from the acquired measurements and then uses gene enrichment analysis as a tool for functionally characterizing the obtained results. Recently Knowledge Driven Variable Selection (KDVS), an alternative approach which performs both steps ...
UNLABELLED Hemoglobin- and catalase-polymerized PEDOT PSS were characterized by X-ray photoelectron spectroscopy, visible and near-IR spectroscopy, FTIR, and ESR. Hemoglobin-polymerized PEDOT PSS possesses bipolarons, while catalase-polymerized PEDOT PSS is dominated by polarons. Use of heme-bound iron as an oxidant yields PEDOT PSS with conductivity of 19.5 S cm(-1) in a single-step aq...
viii CHAPTER 1. GENERAL INTRODUCTION 1 Hypotheses 7 Expected Outcomes 8 References 9 CHAPTER 2. GENOTYPIC VARIATION IN UREIDE CONTENT IN PHASEOLUS VULGARIS L. 19 Abstract 19 Introduction 20 Materials and Methods 21 Results and Discussion 23 Conclusions 28 References 29 CHAPTER 3. SHOOT AND ROOT CONTROL OF UREIDE ACCUMULATION AND PARTITIONING IN PHASEOLUS VULGARIS L. GENOTYPES 46 Abstract 46 Int...
Introduction: Nowadays the medical, therapeutic and pharmacological application of magnetic fields (MF) and its biological effect has raised question about the safety of MF. This study aimed at scrutinizing the effect of static MF on the resistance of S. aureus to antibiotic. Materials and Methods: This prospective, case–control study was conducted to evaluate the e...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید