نتایج جستجو برای: fuzzy vault

تعداد نتایج: 92901  

Journal: :The Journal of Nihon University School of Dentistry 1993
M Hori M Okaue S Matsunaga S Iwanari M Matsumoto H Tanaka K Yamamoto Y Moriya

Two cases of severely atrophic maxilla with poor palatal vault form treated by Kitayama's modified palatal vault osteotomy technique are described. The advantages of this osteotomy technique are outlined in comparison with other surgical methods.

1998
Donald S. Allen

Beginning in 1959, Federal Reserve member banks were allowed to use both vault cash and deposits at Federal Reserve Banks to satisfy statutory reserve requirements. Prior to this time, member banks were restricted to satisfying required reserves solely with deposits at Federal Reserve Banks. Hence, member banks held currency in their vaults only to satisfy daily demands by depositors. Fluctuati...

Journal: :The Laryngoscope 2007
C Spencer Cochran Yadranko Ducic Robert J Defatta

OBJECTIVES To review our experience with our anatomic (medial, transverse, and lateral) nasal osteotomy technique for correcting the asymmetric bony nasal vault in esthetic and functional rhinoplasty. METHODS All patients undergoing anatomic nasal osteotomy technique by the senior author (y.d.) from August 1997 to August 2005 with a minimum follow-up of 6 months were reviewed. Preoperative an...

Journal: :EAI Endorsed Trans. Indust. Netw. & Intellig. Syst. 2015
Huawei Zhao Jiankun Hu

With the development of intelligent mobile phones and the improvement of wireless communication infrastructure, mobile payment is gradually accepted by the public. However, since intelligent mobile phones are not trusted devices, mobile payment faces serious security problems. To address the problems, this paper designs a trusted mobile payment scheme based on body area networks. The scheme bui...

2013
George S. Eskander Robert Sabourin Eric Granger

Bio-Cryptographic systems enforce authenticity of cryptographic applications like data encryption and digital signatures. Instead of simple user passwords, biometrics, such as, fingerprint and handwritten signatures, are employed to access the cryptographic secret keys. The Fuzzy Vault scheme (FV) is massively employed to produce bio-cryptographic systems, as it absorbs variability in biometric...

2015
Sean Michael Tanny Nicholas Niven Sperling E. Ishmael Parsai

NCRP 151 provides very detailed examples demonstrating the necessary concerns for shielding a conventional radiotherapy vault with a maze where the useful beam is parallel to the maze. However, it provides little guidance on how to properly shield a vault with the maze-wall acting as part of a compound primary barrier. We have modeled a new radiotherapy vault with this configuration and assesse...

2013
CURTIS KNOWLES VLADAN JOVANOVIC

With the conceptualization of next generation architecture for Data Warehousing, that is the DW 2.0, there is now an increased emphasis on using fully-temporalized databases, in particular with approaches such as the Data Vault. In this paper we present a template XML Schema for Data Vault model concepts (at a metamodel level) and a process for creating XML Schemas for data warehouse designs re...

2014
Jan Mrazek Daniel Toso Sergey Ryazantsev Xing Zhang Z. Hong Zhou Beatriz Campo Fernandez Valerie A. Kickhoefer Leonard H. Rome

Ribosomes are molecular machines that function in polyribosome complexes to translate genetic information, guide the synthesis of polypeptides, and modulate the folding of nascent proteins. Here, we report a surprising function for polyribosomes as a result of a systematic examination of the assembly of a large ribonucleoprotein complex, the vault particle. Structural and functional evidence po...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید