Results 101 to 110 of about 35,561 (292)
ABSTRACT The impressive growth in the global market for plant‐based foods has a direct impact on the food industry, requiring greater efforts in product reformulation for the replacement of animal‐based ingredients, including proteins. The replacement of animal‐derived proteins frequently applied as emulsifiers in food formulations, for example ...
Thais C. Brito‐Oliveira +2 more
wiley +1 more source
In this day’s world, more and more focused on data protection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryptographic hash function.
Tautvydas Brukštus
doaj +1 more source
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
SSTR4 illetve capsaicin receptor mediált neurogéngyulladás gátló gyógyszerhatóanyagok optimalizációja, karakterizációja és farmakofor model generálása = Optimization, characterization and pharmacophore modeling of SSTR4 or capsaicin receptor mediated neurogenic inflammation inhibiting drug candidates [PDF]
A Klinika II fázisban lévő SSTR4 receptoron ható TT-232 heptapeptid olyan új, eltérő szerkezetű származékait állítottuk elő, ahol a biológiai hatás szempontjából fontos aminosavakat egyrészt egy pirazinon gyűrűvel ciklizáltuk, másrészt egy flexibilis ...
Hollósy, Ferenc +7 more
core
ABSTRACT Due to its small size, microchannel heat exchangers are widely used in fine engineering fields such as electronic equipment. In this paper, the boiling heat transfer characteristics of refrigerants and nanofluids in microchannels are studied by applying electric fields, magnetic fields, and electromagnetic synergistic fields.
Yanyu Wu +4 more
wiley +1 more source
The Brauer-Manin Obstruction and Sha[2].
We discuss the Brauer-Manin obstruction on del Pezzo surfaces of degree 4. We outline a detailed algorithm for computing the obstruction and provide associated programs in magma. This is illustrated with the computation of an example with an irreducible cubic factor in the singular locus of the defining pencil of quadrics (in contrast to previous ...
Bright, MJ, Bruin, N, Flynn, V, Logan, A
openaire +1 more source
A Comparison of the Standardized Versions of ECIES [PDF]
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor +3 more
core
Abstract Dental microwear texture analysis (DMTA) has emerged as a valuable method for investigating the feeding ecology of vertebrates. Over the past decade, three‐dimensional topographic data from microscopic regions of tooth surfaces have been collected, and surface texture parameters have been published for both extant and fossil species.
Mugino O. Kubo +4 more
wiley +1 more source
The antiformal negative flower structure of the Shahejie Formation in the Southwest Sag of Dongpu Depression is the main target of rolling exploration evaluation, but there is limited understanding of its hydrocarbon accumulation events.
Xiaoshui Mu +7 more
doaj +1 more source
Hardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami +3 more
core

