منابع مشابه
Technical note: a histological technique for detecting the cryptic preservation of erythrocytes and soft tissue in ancient human skeletonized remains.
Bone samples from a Middle Bronze Age (ca., 1600-1300 BC) site were prepared for histological analysis. Preliminary results suggested that components of bone marrow remained preserved. To verify these findings and optimize the sample preparation procedure, we conducted experiments varying the type of acid used to decalcify the bones for histology preparation, as well as the exposure time to the...
متن کاملCryptanalysis of GSM encryption algorithm A5/1
The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...
متن کاملCryptic Promoter
mice under the control of a cryptic promoter. kinase is expressed in the testes of transgenic The herpes simplex virus type 1 thymidine
متن کاملThe Krapina dental remains.
An analysis of age, specimen associations, demographic characteristics, and metric features is presented for the Krapina dental sample. A critical analysis of emergence criteria applicable to skeletal samples leads to an occlusal eruption schedule which can be used to determine wear rates. These are used to provide dental ages for the Krapina jaws and isolated teeth. A number of individual asso...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Blood
سال: 2007
ISSN: 0006-4971,1528-0020
DOI: 10.1182/blood-2007-09-111211