Results 41 to 50 of about 6,416 (199)

Human enhancement through the lens of experimental and speculative neurotechnologies

open access: yesHuman Behavior and Emerging Technologies, Volume 1, Issue 4, Page 361-372, October 2019., 2019
Abstract Human enhancement deals with improving on and overcoming limitations of the human body and mind. Pharmaceutical compounds that alter consciousness and cognitive performance have been used and discussed for a long time. The prospect of neurotechnological applications such as brain‐steered devices or using invasive and noninvasive ...
Wessel Teunisse   +2 more
wiley   +1 more source

Spectroscopic methods for authentification. An overview. Analytical methods for the authentification of agro-food products. Gembloux (Belgium). 20 Oct 1999. [PDF]

open access: yesBiotechnologie, Agronomie, Société et Environnement, 2000
An analysis by the probability shows the criterion that an analysis method has to satisfy to allow the authentication of a product. There are two distinct ways of achieving this criterion.
Belton P.
doaj  

Procédés de validation dans les récits d’ambassade marocains du XVIIe et XVIIIe s.

open access: yesRevue des Langues, Cultures et Sociétés, 2017
Dans les récits d’ambassade marocain du 17° et 18° siècles, il est question de représenter une image de l’Autre. Si la validation de cette image est établie, l’ambassadeur arrive également à faire parvenir un message qu’il ne peut exprimer ouvertement à ...
Mohammed DEKHISSI, Driss MESKINE
doaj   +1 more source

Comparative DFT Study of Phytochemical Constituents of the Fruits of Cucumis trigonus Roxb. and Cucumis sativus Linn.

open access: yesJournal of Computational Methods in Physics, Volume 2014, Issue 1, 2014., 2014
The hepatoprotective active phytochemical constituents from the ethanolic extracts of the fruits of Cucumis trigonus Roxb. and Cucumis sativus Linn. were identified by GC‐MS analysis. The density functional theory (DFT) of these molecules was calculated by density functional B3LYP methods using B3LYP/6‐311++G(d,p) basis set. The optimized geometries of
Subarayan Bothi Gopalakrishnan   +3 more
wiley   +1 more source

Untargeted lipidomics approach using LC-Orbitrap HRMS to discriminate lard from beef tallow and chicken fat for the authentification of halal

open access: yesGrasas y Aceites, 2023
This research aimed to perform a lipidomics study using liquid chromatography-high resolution mass spectrometry (LC-HRMS) to identify lard, beef tallow and chicken fat. A total of 292, 345, and 403 lipid compounds were observed in lard, beef tallow, and
A. Windarsih   +4 more
doaj   +1 more source

Chosing method of the keystroking data segmentation for increasing authentification accuracy [PDF]

open access: yes, 2017
Chosing method of the keystroking data segmentation for increasing authentification ...
Горбунов, И. В.   +2 more
core  

The ping-pong protocol can be attacked without eavesdropping

open access: yes, 2004
Attack the ping-pong protocol without eavesdropping.Comment: PACS: 03.67 ...
B. Schneier   +3 more
core   +1 more source

BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION

open access: yesJournal of Information and Organizational Sciences, 2007
In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys.
Tonimir Kišasondi   +2 more
doaj  

L'authentification rapide des poulets de chair sous label: distinction entre poulets issus de souches à croissance lente ou rapide par la spectrometrie dans le proche infrarouge. Analytical methods for the authentification of agro-food products. Gembloux (Belgium). 20 Oct 1999 [PDF]

open access: yesBiotechnologie, Agronomie, Société et Environnement, 2000
Rapid authentification of certified chicken meat: distinguishing slow and fast growing chicken strains using near infrared reflectance spectroscopy.
Fumiere O., Sinnaeve G., Dardenne P.
doaj  

AUTHENTIFICATION USER TOOLS IN CORPORATIVE INFORMATION SYSTEMS AND CLOUD COMPUTING AREAS

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
Analysis elements of users work in information corporative systems (ICS) are done. The mathematical model of social authentification in ICS allows on given quality of unsatisfactory marks to calculate the probability of successful authentification with ...
U. A. Vishniakou, M. M. Gongag Sas
doaj  

Home - About - Disclaimer - Privacy