نتایج جستجو برای: unauthorized exploiters

تعداد نتایج: 4344  

Journal: :Journal of Pain and Symptom Management 2018

Journal: :Applied sciences 2022

As three-dimensional (3D) printing technology is widely used, security issues have arisen, especially in the terminal parts of automobiles, aircraft, and 3D-printed military equipment. If original design models or STL (stereolithography) files are hacked tampered, severe consequences can be anticipated. In this paper, we propose a demonstration to use high-throughput blockchain store “fingerpri...

2015
R. Latorre J. Sadeghinezhad B. Hajimohammadi F. Izadi M. T. Sheibani

Background: Nowadays, there is an increase of meat and animal carcass consumption worldwide. Due to the economic value of meat, the likelihood of using unauthorized tissue is possible in meat products. Based on these observations, the aim of the present study was to apply morphological method for detection of unauthorized tissues in processed meat products. Methods: In this study, a total of 20...

2007
Keith Townsend

(this article cites 33 articles hosted on the Citations commercial use or unauthorized distribution.

Journal: :Pharmacy 2023

Health concerns associated with the consumption of food supplements rise in parallel popularity and market availability these products. In pursuit data related to unauthorized presence pharmaceuticals supplements, Rapid Alert System for Food Feed (RASFF) database was searched 2011–2022 period. The most “popular” adulteration were phosphodiesterase-5 inhibitors (235 records); anorexics laxatives...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید