نتایج جستجو برای: double digest

تعداد نتایج: 245421  

Journal: :Proceedings of the National Academy of Sciences of the United States of America 1974
R Axel W Melchior B Sollner-Webb G Felsenfeld

Staphylococcal nuclease digestion of purified chromatin from duck reticulocytes or calf thymus results in the production of a series of double-stranded DNA fragments of discrete molecular size, ranging from about 130 to 45 base pairs, which can be detected by polyacrylamide gel electrophoresis. Similar patterns of protected DNA fragments are obtained from limit digests of chromatin "reconstitut...

2014
PANOS J. ANTSAKLIS THOMAS PARISINI IOANNIS PASCHALIDIS MARIA PRANDINI L. Paunonen

Journal: :DiGeSt. Journal of Diversity and Gender Studies 2021

DiGeSt 8(1) General Issue - COVID-19 Roundtable

2011
Yu Wang Tomoya Ishikawa Jien Kato Kenichiro Ishii Shigeki Yokoi

In this paper, we present a video digest generation system that designed for use in nursery schools. The system utilizes plural surveillance cameras that set in different nursery rooms, each has a corresponding RFID receiver to catch the signal send by RFID tags. With every kid having a RFID tag in the pocket all the day time, the system automatically generate one daily video digest for each ki...

Journal: :CoRR 2017
Zhen Zeng Zheming Zhou Zhiqiang Sui Odest Chadwicke Jenkins

Scene-level Programming by Demonstration (PbD) is faced with an important challenge perceptual uncertainty. Addressing this problem, we present a scenelevel PbD paradigm that programs robots to perform goal-directed manipulation in unstructured environments with grounded perception. Scene estimation is enabled by our discriminatively-informed generative scene estimation method (DIGEST). Given s...

2008
Pontjho Mokhonoana Martin S. Olivier

A message digest is a fixed length output produced by applying a cryptographic algorithm on input binary data of arbitrary length. If the input data changes even by one bit, the generated message digest will be completely different from the original. This is used in digital investigations to verify that stored digital evidence has not been tampered with. This technique has been applied successf...

2010
L. H. Nguyen

This paper introduces two related methods of generating a new cryptographic primitive termed digest which has similarities to -balanced and almost universal hash functions. Digest functions, however, typically have a very short output, e.g. 16-64 bits, and hence they are not required to resist collision and inversion attacks. They also have the potential to be very fast to compute relative to l...

2013
Henning Klevjer Kent A. Varmedal Audun Jøsang

User authentication to a server is typically done by presenting a username and a password in some protected form to the server, and having the server verify that those credentials correspond to an identity previously registered and authorized for access. It is crucial that attackers never get access to operational passwords, which typically is achieved by encryption in transit, or through a cha...

2012

C. CRITICAL CONTROL POINTS AND MINIMUM STANDARDS 2 Figure 1: Example of a magnetic stirrer method for pooled sample digestion (steps labelled as 1-4 indicate the required sequential order for preparing the digest). 3 C1 Sample collection and preparation for testing 4 C2 Minimum requirements for equipment and consumables 5 C3 Performance of the digestion assay 6 C3.1 Blending of muscle samples 6...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید