Results 41 to 50 of about 1,954 (70)

Implementing Knowledge Translation Strategies in Funded Research in Canada and Australia: A Case Study

open access: yesTechnology Innovation Management Review, 2016
There is an emerging literature describing the use of knowledge translation strategies to increase the relevance and usability of research, yet there are few real-world examples of how this works in practice. This case study reports on the steps taken to
Gabriel Moore   +5 more
doaj  

Enciphering on the basis of the sums with products of weight and free components as summands

open access: yesVestnik Samarskogo Gosudarstvennogo Tehničeskogo Universiteta. Seriâ: Fiziko-Matematičeskie Nauki, 2012
The purpose of the given paper is reviewing of mathematical resources of enciphering of the source text, allowing to ensure the simplicity of appropriate decryption; the source text is a sequence of integer weight coefficients. The composer of the cipher
Alexander I Nikonov
doaj  

Population-Sequencing as a Biomarker of Burkholderia mallei and Burkholderia pseudomallei Evolution through Microbial Forensic Analysis

open access: yesJournal of Nucleic Acids, 2013
Large-scale genomics projects are identifying biomarkers to detect human disease. B. pseudomallei and B. mallei are two closely related select agents that cause melioidosis and glanders.
John P. Jakupciak   +5 more
doaj   +1 more source

About the Soviet Cryptographs’ Contribution to the Great Patriotic War Victory

open access: yesБезопасность информационных технологий, 2015
This article deals with the unknown facts of the soviet cryptograph activity during the Great Patriotic War. The specialists of our Cryptographic Service were able to provide the secret connection between the political and military members of the ...
Dmitry Aleksandrovich Larin
doaj  

IMPLEMENTASI ALGORITMA SUPER ENKRIPSI VIGENERE CIPHER DAN ROUTE CIPHER PADA PENYANDIAN PESAN TEKS

open access: yesJurnal Matematika UNAND
Kemajuan teknologi diiringi dengan meningkatnya ancaman terhadap keamanan serta kerahasiaan informasi pada pesan. Salah satu cara untuk mengamankan pesan dapat menggunakan teknik super enkripsi.
SUSILA BAHRI   +2 more
doaj   +1 more source

FRAGMENTED POLYALPHABETIC CIPHER

open access: yesJournal of New Theory, 2016
In this study, we define a polyalphabetic cipher method that is called fragmented polyalphabetic (FP) cipher that is based on the fragmented Caesar (FC) cipher. In the FP-cipher, plaintext is encrypted by multiple encryption alphabets which are
Yunus Aydogan   +2 more
doaj  

Novel NARS2 variants in a patient with early-onset status epilepticus: case study and literature review

open access: yesBMC Pediatrics
Background NARS2 as a member of aminoacyl-tRNA synthetases was necessary to covalently join a specific tRNA to its cognate amino acid. Biallelic variants in NARS2 were reported with disorders such as Leigh syndrome, deafness, epilepsy, and severe ...
Nuo Yang   +7 more
doaj   +1 more source

FRAGMENTED CAESAR CIPHER

open access: yesJournal of New Theory, 2016
In this study, we define a cipher method that is called fragmented Caesar cipher method that based on the basic logic of Caesar cipher. This new method has more possibility then the classical Caesar cipher because of the fragmented alphabet is ...
Yunus Aydogan, Naim Cagman, Irfan Simsek
doaj  

Large-scale computational modelling of H5 influenza variants against HA1-neutralising antibodiesResearch in context

open access: yesEBioMedicine
Summary: Background: The United States Department of Agriculture has recently released reports that show samples collected from 2022 to 2025 of highly pathogenic avian influenza (H5N1) have been detected in mammals and birds.
Colby T. Ford   +7 more
doaj  

Home - About - Disclaimer - Privacy