نتایج جستجو برای: based trade pin
تعداد نتایج: 3015994 فیلتر نتایج به سال:
Improved Intensity-Based Label-Free Quantification via Proximity-Based Intensity Normalization (PIN)
Researchers are increasingly turning to label-free MS1 intensity-based quantification strategies within HPLC-ESI-MS/MS workflows to reveal biological variation at the molecule level. Unfortunately, HPLC-ESI-MS/MS workflows using these strategies produce results with poor repeatability and reproducibility, primarily due to systematic bias and complex variability. While current global normalizati...
0017-9310/$ see front matter 2009 Elsevier Ltd. A doi:10.1016/j.ijheatmasstransfer.2009.03.069 * Corresponding author. Tel.: +1 518 276 2843; fax E-mail address: [email protected] (M.K. Jensen). A multi-objective thermal design optimization and comparative study of electronics cooling technologies is presented. The cooling technologies considered are: continuous parallel micro-channel heat sinks, ...
Traditional authentication methods (e.g., password, PIN) often do not scale well to the context of mobile devices in terms of security and usability. However, the adoption of Near Field Communication (NFC) on a broad range of smartphones enables the use of NFC-enabled tokens as an additional authentication factor. This additional factor can help to improve the security, as well as usability of ...
Growth and morphogenesis in plants require controlled transport of the plant hormone auxin. An important participant is the auxin effluxing protein PIN, whose polarized subcellular localization allows it to effectively transport auxin large distances through tissues. The flux-based model, in which auxin flux through a wall stimulates PIN allocation to that wall, is a dominant contender among mo...
Pin site infections are a common complication of external fixation that places a significant burden on the patient and healthcare system. Such infections increase the number of clinic visits required during a patient's course of treatment, can result in the need for additional treatment including antibiotics and surgery, and most importantly can compromise patient outcomes should osteomyelitis ...
We give an outline history of the development of Automatic Teller Machines (ATMs). Most of these systems still use a combination of magnetic strip card and personal identification number (PIN) to identify users. We examine a number of threats to the current ways of managing PINs, and outline some options for designers wishing to create more secure systems in the future.
A software program for on-state parameter extraction is presented for the realization of a high quality model for SiC Schottky, Merged PiN Schottky, and PiN Power diodes based on McNutt and Mantooth's Comprehensive SiC Diode model [ 1 ].
We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We specify this API in an imperative language with cryptographic primitives, and show how its flaws are captured by a notion of robustness that extends the one of Myers, Sabelfeld and Zdancewic to our cryptographic settin...
A tangible programming interface called ``Push-pin'' is proposed, which involves end-users in designing smart home programs for home appliance automation. Programming on the Push-pin system is based on a stimulus-response model in which an appliance connected to another appliance via a network gets activated when the other appliance is activated. To interconnect two appliances, the user puts a ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید