نتایج جستجو برای: identity like
تعداد نتایج: 761739 فیلتر نتایج به سال:
Cybersecurity breaches have been at the forefront of most news outlets, recently. People’s Digital Identity has epicenter cybersecurity breaches. Defining composition digital identity is first step risk identification and towards mitigation. management tools are lacking in user-centricity. Organizations like National Institute Standards Technology to craft user-centric personal frameworks.
We cloned and sequenced the cspA-like gene from a psychrotrophic Antarctic soil-dwelling bacterial strain Psychrobacter sp. B6. The gene is 213 bp long and shows 99% and 98% sequence identity with the Psychrobacter cryohalolentis K5 gene encoding a cold-shock DNA-binding domain protein and the Psychrobacter arcticus transcriptional regulator-CspA gene, respectively. The protein encoded by the P...
In insects, selector genes are thought to modify the development of a default, or 'ground state', appendage into a tagma-specific appendage such as a mouthpart, antenna or leg. In the best described example, Drosophila melanogaster, the primary determination of leg identity is thought to result from regulatory interactions between the Hox genes and the antennal-specifying gene homothorax. Based...
In Arabidopsis, different combinations of ABC organ identity proteins interact in the presence of SEPALLATA (SEP) proteins to regulate floral organ differentiation. Ectopic expression of SEP3 in combination with class A and B or B and C genes is sufficient to homeotically convert vegetative leaves into petal-like organs and bracts into stamen-like structures, respectively. Recently, it has been...
Abstract ICAR, Identity Card Automatic Reader, consists of a system for reading identity cards like passports, identity documents and driver licenses. First, document image is acquired by an own acquisition device based on a digital camera chip. Then, the image is analyzed in order to identify document type among a set of predefined models using local features analysis and text localization. Id...
In [3], H. Belbachir and F. Bencherif generalize to bivariate polynomials of Fibonacci and Lucas, properties obtained for Chebyshev polynomials. They prove that the coordinates of the bivariate polynomials over appropriate basis are families of integers satisfying remarkable recurrence relations. [7], Mario Catalani define generalized bivariate polynomials, from which specifying initial conditi...
The authors report a novel approach to testing episodic-like memory for single events. Pigeons were trained in separate sessions to match the identity of a sample on a touch screen, to match its location, and to report on the length of the retention interval. When these 3 tasks were mixed randomly within sessions, birds were more than 80% correct on each task. However, performance on 2 differen...
The research field of Ambient Environments and Ubiquitous Computing aims toward the future vision of intelligent mobile and wireless network scenarios. In such environments where the wireless network consists of numerous nodes, like intelligent devices, sensors and mobile devices, a highly secured and well defined Identity (ID) Management System is required that deals with issues like virtual a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید