نتایج جستجو برای: molecular certificates

تعداد نتایج: 641525  

Journal: :Jornal de pediatria 2002
Ruth N T Turrini Augusto H Santo

OBJECTIVE The purpose of this study was to evaluate the possibility for collecting data on nosocomial infections by means of death certificates. METHODS The medical charts of children who died after 48 hours of their admission to a pediatric hospital were revised to get information about the causes of death. Death certificates were also revised to verify whether they were properly filled out....

2018
Kristi'an Koz'ak Bum Jun Kwon Doowon Kim Christopher Gates Tudor Dumitracs

Recent measurements of the Windows code-signing certificate ecosystem have highlighted various forms of abuse that allow malware authors to produce malicious code carrying valid digital signatures. However, the underground trade that allows miscreants to acquire such certificates is not well understood. In this paper, we illuminate two aspects of this trade. First, we investigate 4 leading vend...

Journal: :The Journal of the Louisiana State Medical Society : official organ of the Louisiana State Medical Society 2010
Clarissa J B Hoff Raoult Ratard

INTRODUCTION The accuracy of death certificates is essential for public health prevention and research in the State of Louisiana. This article analyzes the accuracy of cause of death stated on Louisiana death certificates. METHODS Discharge diagnoses from 2007 Louisiana Hospital Inpatient Discharge Diagnosis (LAHIDD) data were compared with the diagnoses in the cause of death section in the c...

2003
Matei Ciobanu Morogan Sead Muftic

Various types of certificates are basic tools of modern cryptography and networks security. They are used in various protocols, in the form of public key identity certificates, binding a key to its owner or in the form of attribute certificates, being a proof of rights and capabilities of their owner. Management of certificates (creation, distribution, verification, and revocation) is dependent...

2010
Mohamed Amin JABRI

In this paper we propose a new Identity-based certificateless proxy signature transferable to a chain of proxy signers enabling fine-grained delegation, Authentication and Authorization decoupling, and Attributes-based Authorization within the Grid environment without relying on any kind of PKI certificates, proxy certificates or attribute certificates. Security and performance analysis of the ...

Journal: :J. Symb. Comput. 2017
Liyun Dai Ting Gan Bican Xia Naijun Zhan

A barrier certificate can separate the state space of a considered hybrid system (HS) into safe and unsafe parts according to the safety property to be verified. Therefore this notion has been widely used in the verification of HSs. A stronger condition on barrier certificates means that less expressive barrier certificates can be synthesized. On the other hand, synthesizing more expressive bar...

Journal: :تحقیقات مالی اسلامی 0
حسین میثمی استادیار پژوهشکده پولی و بانکی کامران ندری استادیار دانشکده معارف اسلامی و اقتصاد، دانشگاه امام صادق(ع)

this paper tries to evaluate the nature of open market operation in the conventional banking system and to compare the usage of government securities and central bank securities for conducting this operation. in addition, the experience of the iranian central bank in using central bank musharakah certificates is reviewed. the main results of the paper, derived from an analytical- descriptive ap...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید