Results 1 to 10 of about 463,649 (305)

cual-id: globally unique, correctable, and human-friendly sample identifiers for comparative -omics studies [PDF]

open access: goldmSystems, 2015
The number of samples in high-throughput comparative “omics” studies is increasing rapidly due to the declining experimental costs. To keep sample data and metadata manageable, and ensure the integrity of scientific results as the scale of these projects continue to increase, it is essential that we transition to better designed sample identifiers ...
John Chase   +3 more
  +7 more sources

Using Unique Node ID TO Control IPv6 ID Spoofing [PDF]

open access: diamondJournal of Physics: Conference Series, 2021
Abstract Intemet Protocol (IP) has a resent version knowns as (IPv6). Computers on networks could be located and identified via IP. Meanwhile, by monitoring the routing data traffic across internet. Protecting an Identity of IPV6 Packet against ID Spoofing Based on Cryptographic and Steganography techniques are proposed.
Maytham Hakim Ali, Saif Al-Alak
openalex   +2 more sources

Vectors of uniqueness for id/dx [PDF]

open access: bronzeStudia Mathematica, 1988
For the selfadjoint differential operator \(A=id/dx\) with periodic boundary conditions on \(L^ 2[0,1]\), the vectors of uniqueness (as introduced by Nussbaum) are characterized by: \(g\in L^ 2[0,1]\) is not a vector of uniqueness for A if and only if there exists \(f\neq 0\) in \(C^{\infty}(A)\) with a zero of infinite order and supp\(\hat f\subset ...
Ralph de Laubenfels
openalex   +3 more sources

Tree-Based Classification Algorithm for Heterogeneous Unique Item ID Schemes [PDF]

open access: bronze, 2005
For RFID-based applications, the uniqueness of ID assigned to each RFID tag should be guaranteed. Several research/standard organizations such as EPCglobal, ISO/IEC, Ubiquitous ID Center, and so on, have developed their own Unique Item ID (UII) specifications. The existence of various UII schemes may cause interoperability problems between applications
Yong Hwan Lee   +4 more
openalex   +2 more sources

Implementing A Unique Chip Id On A Reconfigurable Polymorphic Circuit

open access: bronzeInformation Technology and Control, 2013
A unique unclonable chip ID has been implemented using various platforms in the recent years. In this paper, we investigate the use of polymorphic gates as a new mechanism for implementing a unique chip ID in systems already containing some polymorphic gates.
Lukáš Sekanina   +4 more
openalex   +3 more sources

Introducing a unique animal ID and digital life history museum for wildlife metadata [PDF]

open access: yesMethods in Ecology and Evolution
Over the past five decades, a large number of wild animals have been individually identified by various observation systems and/or temporary tracking methods, providing unparalleled insights into their lives over both time and space.
Martin Wikelski   +40 more
doaj   +7 more sources

Unique Id Generation for Citizens with Extended Security

open access: bronzeBioscience Biotechnology Research Communications, 2020
B P Nayana
openalex   +2 more sources

Development Of A Clustered Network Based On Unique Hop Id

open access: green, 2012
{"references": ["Yuannzhu Peter Chen, Arthur L. Liestman, and Jiangchun Liu, \"Clustering Algorithms for Ad Hoc Wireless Networks,\" In Ad Hoc and Sensor Networks, Y. Xiao and Y. Pan, Eds. Nova Science Publisher, Date 2004.", "M. Gerla and J. T. C. Tsai, \"Multicluster, Mobile, Multimedia Radio Net-works,\" Wireless Networks, Vol. 1, N\u0131.
Hemanth Kumar   +3 more
openalex   +3 more sources

Unique ID System

open access: bronzeInternational Journal for Research in Applied Science and Engineering Technology, 2018
Chaitali Desai
openalex   +2 more sources

Extract Unique Personal ID Using Fingerprint

open access: goldDiyala Journal For Pure Science, 2017
Abdul Monem S. Rahma, Esraa Q. Naamha
openalex   +2 more sources

Home - About - Disclaimer - Privacy