Results 111 to 120 of about 981,793 (347)
Russian Cryptographic Algorithms in the Identity Management Systems
The subject of the research is to implement Russian cryptographic algorithms in the IdM-systems. The research centers on the study of the claim-based authentication protocols and the existing IdM-systems and on the development of an authentication module
A.V. Dubovitskaya, P. V. Smirnov
doaj
Background: Initial analyses of the impact of physical attractiveness in a business context have supported the ‘what is beautiful is good’ contention. However, in circumstances characterised by negative emotions, duress and stress, very little is known ...
Christo Boshoff
doaj +1 more source
Workflow of a high‐throughput technology for epigenotyping of differentially methylated CpGs in specific regions of the genome. The protocol works with small amounts of DNA extracted from blood or semen. The protocol consists of both enzymatic conversion of unmethylated cytosines and capture by hybridization with a custom panel.
Nathalie Iannuccelli+4 more
wiley +1 more source
Internet Service Provider Liability for Contributory Trademark Infringement After Gucci [PDF]
[I]f a manufacturer or distributor intentionally induces another to infringe a trademark, or if it continues to supply its product to one whom it knows or has reason to know is engaging in trademark infringement, the manufacturer or distributor is ...
Walsh, Gregory C.
core +1 more source
Service Provider Revenue Dependence of Offered Number of Service Classes [PDF]
In this paper possible applications of responsive pricing scheme and Stackelberg game for pricing telecommunication services with service provider as a leader and users acting as followers are analyzed. We have classified users according to an elasticity
V. S. Aćimović-Raspopović+1 more
doaj
This study presents a novel approach to teaching Python and bioinformatics using team‐based learning and cloud‐hosted notebooks. By integrating interactive coding into biomedical education, the method improves accessibility, student engagement, and confidence—especially for those without a computing background.
Nuno S. Osório, Leonardo D. Garma
wiley +1 more source
Book Review: Professional Self-Management: Techniques for Special Service Providers [PDF]
Margaret Anne Coles
openalex +1 more source
Mining Target-Oriented Fuzzy Correlation Rules to Optimize Telecom Service Management
To optimize telecom service management, it is necessary that information about telecom services is highly related to the most popular telecom service. To this end, we propose an algorithm for mining target-oriented fuzzy correlation rules. In this paper,
Chueh, Hao-En
core +3 more sources
ObjectivesPre-exposure prophylaxis (PrEP) has been an essential element of the national combination prevention package and included in the Universal Health Coverage (UHC) of Thailand since 2019.
Ajaree Rayanakorn+6 more
doaj +1 more source
Internet service provider used in today's rapidly growing with a wide selection of advantages and disadvantages. Because it was so many criteria - criteria that can be used as a basic internet service providers the most suitable to be applied in the ...
Yogi Prihartono, Hilyah Magdalena
doaj +1 more source