Human enhancement through the lens of experimental and speculative neurotechnologies
Abstract Human enhancement deals with improving on and overcoming limitations of the human body and mind. Pharmaceutical compounds that alter consciousness and cognitive performance have been used and discussed for a long time. The prospect of neurotechnological applications such as brain‐steered devices or using invasive and noninvasive ...
Wessel Teunisse +2 more
wiley +1 more source
Spectroscopic methods for authentification. An overview. Analytical methods for the authentification of agro-food products. Gembloux (Belgium). 20 Oct 1999. [PDF]
An analysis by the probability shows the criterion that an analysis method has to satisfy to allow the authentication of a product. There are two distinct ways of achieving this criterion.
Belton P.
doaj
Procédés de validation dans les récits d’ambassade marocains du XVIIe et XVIIIe s.
Dans les récits d’ambassade marocain du 17° et 18° siècles, il est question de représenter une image de l’Autre. Si la validation de cette image est établie, l’ambassadeur arrive également à faire parvenir un message qu’il ne peut exprimer ouvertement à ...
Mohammed DEKHISSI, Driss MESKINE
doaj +1 more source
The hepatoprotective active phytochemical constituents from the ethanolic extracts of the fruits of Cucumis trigonus Roxb. and Cucumis sativus Linn. were identified by GC‐MS analysis. The density functional theory (DFT) of these molecules was calculated by density functional B3LYP methods using B3LYP/6‐311++G(d,p) basis set. The optimized geometries of
Subarayan Bothi Gopalakrishnan +3 more
wiley +1 more source
This research aimed to perform a lipidomics study using liquid chromatography-high resolution mass spectrometry (LC-HRMS) to identify lard, beef tallow and chicken fat. A total of 292, 345, and 403 lipid compounds were observed in lard, beef tallow, and
A. Windarsih +4 more
doaj +1 more source
Chosing method of the keystroking data segmentation for increasing authentification accuracy [PDF]
Chosing method of the keystroking data segmentation for increasing authentification ...
Горбунов, И. В. +2 more
core
The ping-pong protocol can be attacked without eavesdropping
Attack the ping-pong protocol without eavesdropping.Comment: PACS: 03.67 ...
B. Schneier +3 more
core +1 more source
BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION
In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys.
Tonimir Kišasondi +2 more
doaj
L'authentification rapide des poulets de chair sous label: distinction entre poulets issus de souches à croissance lente ou rapide par la spectrometrie dans le proche infrarouge. Analytical methods for the authentification of agro-food products. Gembloux (Belgium). 20 Oct 1999 [PDF]
Rapid authentification of certified chicken meat: distinguishing slow and fast growing chicken strains using near infrared reflectance spectroscopy.
Fumiere O., Sinnaeve G., Dardenne P.
doaj
AUTHENTIFICATION USER TOOLS IN CORPORATIVE INFORMATION SYSTEMS AND CLOUD COMPUTING AREAS
Analysis elements of users work in information corporative systems (ICS) are done. The mathematical model of social authentification in ICS allows on given quality of unsatisfactory marks to calculate the probability of successful authentification with ...
U. A. Vishniakou, M. M. Gongag Sas
doaj

