نتایج جستجو برای: 12954 ngg

تعداد نتایج: 116  

This study focuses on optimization and validation of an Ultrahigh-performance liquid chromatography tandem mass spectrometry (UHPLC-MS/MS) method for simultaneous analysis of 11mycotoxins: Aflatoxin B1, T-2 Toxin, Ochratoxin A, Deoxynivalenol and Zearalenone in wheat matrix. Sample extraction and cleanup procedure is based on a single extraction step using acetonitrile/water/acetic acid mixture...

This study focuses on optimization and validation of an Ultrahigh-performance liquid chromatography tandem mass spectrometry (UHPLC-MS/MS) method for simultaneous analysis of 11mycotoxins: Aflatoxin B1, T-2 Toxin, Ochratoxin A, Deoxynivalenol and Zearalenone in wheat matrix. Sample extraction and cleanup procedure is based on a single extraction step using acetonitrile/water/acetic acid mixture...

Journal: :Manisa Celal bayar üniversitesi sosyal bilmler dergisi 2021

Bu araştırmanın amacı, otizm spektrum bozukluğu (OSB) tanılı ve normal gelişim gösteren (NGG) 9-12 yaş grubu çocuğa sahip annelerin çocuk yetiştirme tutumlarının incelenmesidir. Çalışma grubunu, 90 NGG 70 OSB’li çocuğu olan 160 anne oluşturmuştur. Verilerin toplanmasında Anne-Baba Tutum Ölçeği (ABTÖ)-C Formu kullanılmıştır. analizinde Kruskal Wallis-H Mann Whitney-U testlerinden yararlanılmıştı...

2015
J C McGrath A J Pawson J L Sharman S P H Alexander

LINKED EDITORIALS This Editorial is part of a series. To view the other Editorials in this series, visit: http://onlinelibrary.wiley.com/doi/10.1111/bph.12956/abstract; http://onlinelibrary.wiley.com/doi/10.1111/bph.12954/abstract; http://onlinelibrary.wiley.com/doi/10.1111/bph.12955/abstract and http://onlinelibrary.wiley.com/doi/10.1111/bph.12856/abstract. VIDEO To view the video on the IUP...

Journal: :Chemosphere 2007
Heinz Rüdel Josef Müller Jürgen Steinhanses Christa Schröter-Kermani

In archived samples from the German environmental specimen bank (ESB) organotin compounds including tributyltin (TBT) and triphenyltin (TPT) as well as their potential degradation products were quantified. Muscles of bream (Abramis brama) sampled in the period 1993-2003 from the rivers Rhine, Elbe, Saale, Mulde, Saar, and from Lake Belau (period 1988-2003) were analyzed by gas chromatography/at...

Journal: :Healthcare policy = Politiques de sante 2011
Andrea Baumann Mabel Hunsberger Mary Crea-Arsenio

Historically, economic changes have negatively affected the nursing workforce in Ontario. The trend towards part-time and casual employment emerged from healthcare restructuring in the 1990s. The severe acute respiratory syndrome (SARS) outbreak in 2003 alerted the Ontario government to the issue of part-time and casual nursing. In 2007, the Nursing Graduate Guarantee (NGG), a health human reso...

Journal: :Environmental pollution 2006
Petra Pribylová Jana Klánová Ivan Holoubek

Wide distribution of chlorinated paraffins in the environment has already been demonstrated in several studies; however, information about their levels in the Central Europe is still very limited. First study focused on the SCCP contamination of the Czech aquatic environment have been performed recently, and its results motivated the authors to analyze sediments from a wide set of the Czech riv...

2009
Syed Naqvi Paolo Mori

The GridTrust Security Framework (GSF) offers security and trust management for the next generation Grids (NGG). It follows a vertical approach for Grid security from requirements level right down to application and middleware levels. New access control models for collaborative computing, such as the usage control model (UCON), are implemented for securing the Grid systems. The GSF is composed ...

Journal: :Building of Informatics, Technology and Science (BITS) 2022

Data and information in the development of digital technology have an important role. Every activity or that uses is related to data information, so security confidentiality are very important. To maintain confidentiality, protection with cryptographic techniques needed. Cryptographic encryption, which where process scrambling carried out hiding a key system, while decryption changing condition...

Journal: :Des. Codes Cryptography 2008
Andreas Klein

In this article we present some weaknesses in the RC4 cipher and their cryptographic applications. Especially we improve the attack described in [2] in such a way, that it will work, if the weak keys described in that paper are avoided. A further attack will work even if the first 256 Byte of the output remain unused. Finally we show that variants of the RC4 algorithm like NGG and RC4A are also...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید