نتایج جستجو برای: کمبودآهن id
تعداد نتایج: 28350 فیلتر نتایج به سال:
Anti-idiotope (anti-Id) Abs have a role in therapy against B cell lymphomas, as inhibitors of pathogenic autoantibodies, and as surrogate Ags for immunization. Despite these observations, the mechanism by which Id(+) Ig generates anti-Id Abs is essentially unknown. To address this issue, we generated a double knock-in mouse that expresses V regions of a somatically mutated anti-Id mAb with inte...
Inductive Inference Machines (IIMs) attempt to identify functions given only input-output pairs of the functions. Pro6a6ilistic IIMs are defined, as is the probability that a probabilistic IIM identifies a function with respect to two common identification criteria: EX and BC. Let ID denote either of these criteria. Then IDpm&) is the family of sets of functions U for which there is a probabili...
Existing literature demonstrates that infants can discriminate between categories of infantdirected (ID) speech based on the speaker’s intended message – that is, infants recognize the difference between comforting and approving ID speech, and treat different utterances from within these two categories similarly. Furthermore, the literature also demonstrates that infants understand many aspects...
In this paper we study the L-convergence of the Riesz means S R(f) for the sublaplacian on the sphere S in the complex n-dimensional space C. We show that S R(f) converges to f in L (S) when δ > δ(p) := (2n− 1)| 2 − 1 p |. The index δ(p) improves the one found by Alexopoulos and Lohoué [AL], 2n| 1 2 − 1 p |, and it coincides with the one found by Mauceri [Ma] and, with different methods, by Mül...
Variations in clothing alter an individual’s appearance, making the problem of gait identification much more difficult. If the type of clothing differs between the gallery and a probe, certain parts of the silhouettes are likely to change and the ability to discriminate subjects decreases with respect to these parts. A part-based approach, therefore, has the potential of selecting the appropria...
In 2010, Fan et al. proposed an efficient anonymous multi-receiver identity-based encryption scheme. This scheme allows a sender to send an encrypted message to a set of designated receivers while preserving receiver anonymity. The scheme is highly efficient for each receiver as it requires only two pairing operations. However, we found that the scheme failed to protect receiver anonymity and t...
In the psychology of language, most accounts of self-monitoring assume that it is based on comprehension. Here we outline and develop the alternative account proposed by Pickering and Garrod (2013), in which speakers construct forward models of their upcoming utterances and compare them with the utterance as they produce them. We propose that speakers compute inverse models derived from the dis...
Speakers' sex identification scores were elicited in order to test the possible perceptual function of minor differentiating cues. The variable cues under investlgation, FO range and F3 location, were manipulated and presented to listeners in a pairwise comparison task. Minor F3 location variation yielded results in the expected direction, whereas FO range proved to be too small to be perceptua...
Starting with any selectively secure identity-based encryption (IBE) scheme, we give generic constructions of fully secure IBE and selectively secure hierarchical IBE (HIBE) schemes. Our HIBE scheme allows for delegation arbitrarily many times.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید