نتایج جستجو برای: unauthorized tissues

تعداد نتایج: 198978  

Journal: :Pharmacy 2023

Health concerns associated with the consumption of food supplements rise in parallel popularity and market availability these products. In pursuit data related to unauthorized presence pharmaceuticals supplements, Rapid Alert System for Food Feed (RASFF) database was searched 2011–2022 period. The most “popular” adulteration were phosphodiesterase-5 inhibitors (235 records); anorexics laxatives...

2012
Anna Plichta Szymon Szominski

We can distinguish three basic properties of information security, which should be implemented in nearly all IT systems: confidentiality, integrity and availability. Confidentiality means to protect the information against unauthorized access. Integrity is mentioned as a warranty of authenticity of information; it is also connected with protection against unauthorized interference. Availability...

2016
Michael Kagan Hiroshi Motomura

President Obama has made executive action and prosecutorial discretion his signature contributions to immigration policy. His aim has been to focus enforcement against immigrants caught at the border or with criminal records while easing the path toward integration for others. 1 These actions—a collection of policies that use discretion to improve the legal standing of millions of unauthorized ...

2011
B. N. Epifantsev A. A. Shelupanov

In the article there is the information about growth of unauthorized works on trunk pipelines and about corresponding economic losses as the result of the works. The structure of interconnecting security system for mentioned objects is offered. The interconnecting security system includes optical, vibroacoustic and seismic data acquisition channels and provides decision making algorithm for the...

2015
Shital Daulat Jagtap Manoj Kumar Singh

Cryptography is the technique of changing data or information into unreadable for unauthorized persons. In cryptography process information transfer from sender to receiver in a manner that prevents from unauthorized third person. There are so many cryptography methods are available which based on number theory. The cryptography based on number system has some disadvantages such as large comput...

2004
Jack T. Brassil

AbstracfModern computer networks make it possible to distribute documents quickly and economically by electronic means rather than by conventional paper means. However, the widespread adoption of electronic distribution of copyrighted material is currently impeded by the ease of unauthorized copying and dissemination. In this paper we propose techniques that discourage unauthorized distribution...

2014
Chien-Hsing Liao Tai-Kuo Woo

Communication systems have to be made secure against unauthorized interception or against disruption or corruption in complicated electromagnetic environments. There are mainly three security categories used to delineate wireless communication systems generally, such as shown in Fig. 1, i.e., INFOSEC, COMSEC, and TRANSEC. We state about information security (INFOSEC) as that trying to against u...

Journal: :international journal of advanced biological and biomedical research 2014
mojdeh khanalizadeh mahmood najafian

introduction and objective: liver is an important body organ without which life is impossible. cyclophosphamide is an alkylating agent widely used as an anti-cancer (“antineoplastic” or “cytotoxic”) chemotherapy drug. the present study aimed to find a suitable antioxidant and examine the effect of vitamin e and selenium on reducing the side effects of cyclophosphamide on liver as a vital organ....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید