نتایج جستجو برای: identity like

تعداد نتایج: 761739  

Journal: :Muma business review 2021

Cybersecurity breaches have been at the forefront of most news outlets, recently. People’s Digital Identity has epicenter cybersecurity breaches. Defining composition digital identity is first step risk identification and towards mitigation. management tools are lacking in user-centricity. Organizations like National Institute Standards Technology to craft user-centric personal frameworks.

Journal: :Acta biochimica Polonica 2009
Agnieszka Kaufman-Szymczyk Arkadiusz Wojtasik Paweł Parniewski Aneta Białkowska Karolina Tkaczuk Marianna Turkiewicz

We cloned and sequenced the cspA-like gene from a psychrotrophic Antarctic soil-dwelling bacterial strain Psychrobacter sp. B6. The gene is 213 bp long and shows 99% and 98% sequence identity with the Psychrobacter cryohalolentis K5 gene encoding a cold-shock DNA-binding domain protein and the Psychrobacter arcticus transcriptional regulator-CspA gene, respectively. The protein encoded by the P...

Journal: :Development 2005
Scott W Herke Nahum V Serio Bryan T Rogers

In insects, selector genes are thought to modify the development of a default, or 'ground state', appendage into a tagma-specific appendage such as a mouthpart, antenna or leg. In the best described example, Drosophila melanogaster, the primary determination of leg identity is thought to result from regulatory interactions between the Hox genes and the antennal-specifying gene homothorax. Based...

Journal: :Mechanisms of Development 2006
Raffaella Battaglia Vittoria Brambilla Lucia Colombo Antoine R. Stuitje Martin M. Kater

In Arabidopsis, different combinations of ABC organ identity proteins interact in the presence of SEPALLATA (SEP) proteins to regulate floral organ differentiation. Ectopic expression of SEP3 in combination with class A and B or B and C genes is sufficient to homeotically convert vegetative leaves into petal-like organs and bracts into stamen-like structures, respectively. Recently, it has been...

2007
Vicente Chapaprieta Josep Lladós Felipe Lumbreras Jordi López

Abstract ICAR, Identity Card Automatic Reader, consists of a system for reading identity cards like passports, identity documents and driver licenses. First, document image is acquired by an own acquisition device based on a digital camera chip. Then, the image is analyzed in order to identify document type among a set of predefined models using local features analysis and text localization. Id...

2017
Yogesh Kumar Gupta Mamta Singh

In [3], H. Belbachir and F. Bencherif generalize to bivariate polynomials of Fibonacci and Lucas, properties obtained for Chebyshev polynomials. They prove that the coordinates of the bivariate polynomials over appropriate basis are families of integers satisfying remarkable recurrence relations. [7], Mario Catalani define generalized bivariate polynomials, from which specifying initial conditi...

Journal: :Journal of experimental psychology. Animal behavior processes 2006
Shannon I Skov-Rackette Noam Y Miller Sara J Shettleworth

The authors report a novel approach to testing episodic-like memory for single events. Pigeons were trained in separate sessions to match the identity of a sample on a touch screen, to match its location, and to report on the length of the retention interval. When these 3 tasks were mixed randomly within sessions, birds were more than 80% correct on each task. However, performance on 2 differen...

2008
Hasan Akram Mario Hoffmann

The research field of Ambient Environments and Ubiquitous Computing aims toward the future vision of intelligent mobile and wireless network scenarios. In such environments where the wireless network consists of numerous nodes, like intelligent devices, sensors and mobile devices, a highly secured and well defined Identity (ID) Management System is required that deals with issues like virtual a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید