نتایج جستجو برای: eap articles

تعداد نتایج: 107749  

1999
Y. Bar-Cohen S. Leary M. Shahinpoor J. O. Harrison J. Smith

Miniature, lightweight, miser actuators that operate similar to biological muscles can be used to develop robotic devices with unmatched capabilities to impact many technology areas. Electroactive polymers (EAP) offer the potential to producing such actuators and their main attractive feature is their ability to induce relatively large bending or longitudinal strain. Generally, these materials ...

Journal: :RFC 2010
Katrin Hoeper Madjid Nakhjiri Yoshihiro Ohba

This document describes an abstract mechanism for delivering root keys from an Extensible Authentication Protocol (EAP) server to another network server that requires the keys for offering security protected services, such as re-authentication, to an EAP peer. The distributed root key can be either a usage-specific root key (USRK), a domain-specific root key (DSRK), or a domain-specific usagesp...

Journal: :Infection and immunity 1988
B H Bjornson E Agura J M Harvey M Johns R G Andrews W R McCabe

Proteins coextracted with endotoxin, termed endotoxin-associated protein (EAP), have been shown to exert interleukin 1-like activities. The present studies demonstrate that EAP also exerts potent granulopoietic colony-stimulating activity (CSA) on human peripheral blood and bone marrow progenitor cells, comparable to that seen with various types of conditioned media. The CSA observed with EAP a...

2006
Pascal Urien Mesmin Dandjinou

This paper presents our work relating to introduction of EAP smartcards in emerging wireless LAN like Wi-Fi or WiMax. We analyse basic characteristics involved in authentication protocols from feasibility and performances points of view. We shortly introduce our open Java architecture, and underline some observed interoperability issues. We present and analyze results obtained with five differe...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

hedging is a multi-purpose rhetorical strategy which is usually used in scientific arguments to secure ratification of claims, reduce the risk of negation, avoid conflict, manage disagreement and leave room for the audience to assess presented information. hedges are frequently used in research articles to mitigate the findings of research endeavors. the present research aims to investigate the...

2012
Andrew M. Edwards Maria Gabriela Bowden Eric L. Brown Maisem Laabei Ruth C. Massey

Staphylococcus aureus is a leading cause of bacteraemia, which frequently results in complications such as infective endocarditis, osteomyelitis and exit from the bloodstream to cause metastatic abscesses. Interaction with endothelial cells is critical to these complications and several bacterial proteins have been shown to be involved. The S. aureus extracellular adhesion protein (Eap) has man...

2008
M. Descoteaux J-F. Mangin C. Poupon

INTRODUCTION: Many recent techniques have been introduced for high angular resolution diffusion imaging (HARDI) [1 and references therein], to infer the diffusion or fiber orientation distribution function (ODF) of the underlying tissue structure. These methods, mostly designed for fiber tractography, are normally based on a single shell acquisition and can only recover some angular information...

2017
Chuyang Ye

By capturing the anisotropic water diffusion in tissue, diffusion magnetic resonance imaging (dMRI) provides a unique tool for noninvasively probing the tissue microstructure and orientation in the human brain. The diffusion profile can be described by the ensemble average propagator (EAP), which is inferred from observed diffusion signals. However, accurate EAP estimation using the number of d...

2001
H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the GSM Subscriber Identity Module (SIM). Haverinen Expires in six months [Page 1] Internet Draft EAP SIM Authentication November 2001

2012
Z. Cao H. Deng

The Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. The EAP Re-authentication Protocol (ERP) specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an EAP re-authentication server through any authenticator. Authenticated Antici...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید