منابع مشابه
Bile Acids XXI. METABOLISM OF 3a,6~-DIHYDROXY-5~-CHOLANOIC ACID-24-‘4C-6a-“H IN THE RAT*
Our previous communication (2) reported the metabolism of lithocholic acid-24-W in the rat and the identification of chenodeoxycholic acid, 30(, 6/3-dihydroxy-5@-cholanoic acid, cy-muricholic acid, and P-muricholic acid as metabolites in the bile. Since previous studies (3) have shown that chenodeoxycholic acid is metabolized to QIand P-muricholic acids in the rat, chenodeoxycholic acid is prob...
متن کاملPolybius: Secure Web Single-Sign-On for Legacy Applications
Web-based interfaces to applications in all domains of university life are surging. Given the diverse demands in and the histories of universities, combined with the rapid IT industry developments, all attempts at a sole all-encompassing platform for single-sign-on (SSO) will remain futile. In this paper, we present an architecture for a meta-SSO, which is able to seamlessly integrate with a wi...
متن کاملXxi. Neurology
2. Transient Probability Distributions of Nerve Impulse Intervals, S. B. Thesis, Department of Physics, M.I. T., June 1964. The time evolution of the distribution of nerve-impulse intervals was examined by measuring histograms at varying times in the stimulus cycle. The distribution width was found to vary inversely as the stimulus strength. There is an indication that the width also depends up...
متن کاملAn Extended Version of the Polybius Cipher
This paper provides a security method which can be used for data that contains alphabets, numerals and some special symbols during their transmission. A discussion about cryptology and the existing Polybius cipher is made. The existing Polybius cipher is based on the use of a 5X5 matrix of letters constructed using numbers from 1 to 5. This square can allow the text that contains alphabets only...
متن کاملDevelopment of Modified Polybius Technique for Data Security
In present scenario sharing of information is increasing significantly. The information is being transmitted to different user and undergoes various passive and active attacks; therefore, the information security plays a challenging role in communication. Cryptography plays a vital role in secure wireless communication and provides an excellent solution to offer the necessary protection against...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Classical Philology
سال: 1920
ISSN: 0009-837X,1546-072X
DOI: 10.1086/360295