نتایج جستجو برای: identity like

تعداد نتایج: 761739  

Journal: :The Journal of general virology 2007
Masashi Ninomiya Tsutomu Nishizawa Masaharu Takahashi Felipe R Lorenzo Tooru Shimosegawa Hiroaki Okamoto

In the process of searching for the recently described small anelloviruses 1 and 2 (SAVs) with the genomic DNA length of 2.2 or 2.6 kb in human sera, we isolated a novel virus with its genomic organization resembling those of torque teno virus (TTV) of 3.8-3.9 kb and torque teno mini virus (TTMV) of 2.8-2.9 kb. The entire genomic sequence of three isolates (MD1-032, MD1-073 and MD2-013), which ...

2016
Visar Berisha Suruchi Thapar-Björkert

This paper aims to show how identity can be of importance to issues relating to development. More 1 specifically, it deals with how the Kosovar Albanians perception of their collective identity have affected Kosovo’s economic development. The study draws primarily from the theories of Identity Economics and Orientalism and presents a hypothesis which is then tested empirically through the analy...

Journal: :The Plant journal : for cell and molecular biology 2007
Ludovico Dreni Sara Jacchia Fabio Fornara Monica Fornari Pieter B F Ouwerkerk Gynheung An Lucia Colombo Martin M Kater

Genes that control ovule identity were first identified in Petunia. Co-suppression of both FLORAL BINDING PROTEIN 7 (FBP7) and FBP11, two D-lineage genes, resulted in the homeotic transformation of ovules into carpelloid structures. Later in Arabidopsis it was shown that three genes, SHATTERPROOF1 (SHP1), SHP2, and SEEDSTICK (STK), redundantly control ovule identity, because in the stk shp1 shp...

2012
Hiten Choudhury Basav Roychoudhury Dilip Kr. Saikia

Cellular networks have evolved through various generations, starting with 1G, followed by 2G and then by 3G, cellular networks have come a long way. A recent technology that has marked the beginning of 4G is Long Term Evolution (LTE). While transmission technologies, authentication mechanisms, confidentiality protection, etc., improved significantly through the generations, not much has improve...

2009
Carla D. Savage Andrew V. Sills

We show that an identity of Gessel and Stanton (Trans. Amerc. Math Soc. 277 (1983), p. 197, Eq. (7.24)) can be viewed as a a symmetric version of a recent analytic variation of the little Göllnitz identities. This is significant, since the Göllnitz-Gordon identities are considered the usual symmetric counterpart to little Göllnitz theorems. Is it possible, then, that the Gessel-Stanton identity...

Journal: :iau international journal of social sciences 2011
hamid pouryoussefi sara sharifnia

the present study is aimed at assessing the state of national identity among female students of ahwaz islamic azad university and explores the social factors affecting upon it. the statistical society consisted of 8532 students at the three levels of associate diploma undergraduate and master degrees. the research method in this study is a “survey” and collection of data has been carried out by...

Journal: :Academic medicine : journal of the Association of American Medical Colleges 2015
Richard L Cruess Sylvia R Cruess J Donald Boudreau Linda Snell Yvonne Steinert

Recent calls to focus on identity formation in medicine propose that educators establish as a goal of medical education the support and guidance of students and residents as they develop their professional identity. Those entering medical school arrive with a personal identity formed since birth. As they proceed through the educational continuum, they successively develop the identity of a medi...

2009
Barath Raghavan Tadayoshi Kohno Alex C. Snoeren David Wetherall

Today’s Internet architecture makes no deliberate attempt to provide identity privacy—IP addresses are, for example, often static and the consistent use of a single IP address can leak private information to a remote party. Existing approaches for rectifying this situation and improving identity privacy fall into one of two broad classes: (1) building a privacy-enhancing overlay layer (like Tor...

2013
Joana Dimas Phil Lopes Rui Prada

One of the challenges in developing multi-agent systems is the creation of agents able to exhibit human-like behaviours in complex social situations. In order to do so, agents need to be socially aware of their environment and perceive other agents not only as individuals but also as social group members. Following Social Identity and Self-Categorization theories, we developed the Dynamic Ident...

2011
Jostein Jensen

Federated Identity Management is considered a promising approach to facilitate secure resource sharing between collaborating partners. A structured survey has been carried out in order to document the benefits of adopting such systems from a user and business perspective, and also to get an indication on how Integrated Operations in the oil and gas industry can benefit from identity federations...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید