نتایج جستجو برای: dpa

تعداد نتایج: 1788  

Journal: :Spectrochimica acta. Part A, Molecular and biomolecular spectroscopy 2005
A A Kolomenskii H A Schuessler

Raman spectra of dipicolinic acid (DPA) are important for detection of bacterial spores, since DPA and its salts present one of their major components. The implementation of a deeply cooled CCD camera in combination with pulsed excitation at 532 nm allowed measuring well-resolved Raman spectra of the DPA in different forms. Powder preparations, crystals grown from saturated solutions and aqueou...

Journal: :Queueing Syst. 2016
Augustus J. E. M. Janssen Johan van Leeuwaarden

The dominant pole approximation (DPA) is a classical analytic method to obtain from a generating function asymptotic estimates for its underlying coefficients. We apply DPA to a discrete queue in a critical many-sources regime, in order to obtain tail asymptotics for the stationary queue length. As it turns out, this regime leads to a clustering of the poles of the generating function, which re...

Journal: :Journal of chromatography. A 2005
David R Rudell James P Mattheis John K Fellman

A method was developed for extracting, identifying, and quantifying diphenylamine (DPA) derivatives in the peel of DPA-treated apples using gradient reversed-phase liquid chromatography with ultraviolet-visible absorption and atmospheric pressure chemical ionization detection (LC-UV-vis-APCI-MS). Compounds routinely analyzed using this method included hydroxylated, nitrosated, nitrated, and met...

2007
Jean-Sébastien Coron Emmanuel Prouff Matthieu Rivain

In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementations. In this context a higher order masking scheme has been proposed by Schramm and Paar at CTRSA 2006. The authors claimed that the scheme is resistant against d-th order DPA for any arbitrary chosen order d. In this paper, w...

2012
Michal Babic Daniel Horak Pavla Jendelova Vit Herynek Vladimir Proks Vaclav Vanecek Petr Lesny Eva Sykova

Sodium hyaluronate (HA) was associated with dopamine (DPA) and introduced as a coating for maghemite (γ-Fe(2)O(3)) nanoparticles obtained by the coprecipitation of iron(II) and iron(III) chlorides and oxidation with sodium hypochlorite. The effects of the DPA anchorage of HA on the γ-Fe(2)O(3) surface on the physicochemical properties of the resulting colloids were investigated. Nanoparticles c...

Journal: :Journal of applied microbiology 2009
B Setlow L Peng C A Loshon Y-Q Li G Christie P Setlow

AIMS To determine roles of cortex lytic enzymes (CLEs) in Bacillus megaterium spore germination. METHODS AND RESULTS Genes for B. megaterium CLEs CwlJ and SleB were inactivated and effects of loss of one or both on germination were assessed. Loss of CwlJ or SleB did not prevent completion of germination with agents that activate the spore's germinant receptors, but loss of CwlJ slowed the rel...

Journal: :The Journal of craniofacial surgery 2013
Susumu Omura Toshinori Iwai Shogo Murata Iwai Tohnai

For accurate superior or posterior repositioning of the maxilla in Le Fort I osteotomy, bone removal around the descending palatine artery (DPA) and maxillary tuberosity is required. Because the most common site of hemorrhage in the Le Fort I osteotomy is the posterior maxilla, this bone removal provides surgeons to surgical frustration of DPA injury. When the DPA is injured during the bone rem...

2005
Marc Joye Pascal Paillier Berry Schoenmakers

Differential Power Analysis (DPA) is a powerful cryptanalytic technique aiming at extracting secret data from a cryptographic device by collecting power consumption traces and averaging over a series of acquisitions. In order to prevent the leakage, hardware designers and software programmers make use of masking techniques (a.k.a. data whitening methods). However, the resulting implementations ...

Journal: :IACR Cryptology ePrint Archive 2010
Shubo Liu Ming Tang Si Gao Huanguo Zhang

Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized to construct different countermeasures against DPAs, such as balancing technologies. We propose a novel methodology to implement a secure DPA resistant crypto processor and we name this as evolutionary cipher(EVOC). EVO...

2012
Weifan Gao Sukumar Saha Din-Pow Ma Yufang Guo Johnie N. Jenkins David M. Stelly

A cotton fiber cDNA and its genomic sequences encoding an A-type cyclin-dependent kinase (GhCDKA) were cloned and characterized. The encoded GhCDKA protein contains the conserved cyclin-binding, ATP binding, and catalytic domains. Northern blot and RT-PCR analysis revealed that the GhCDKA transcript was high in 5-10 DPA fibers, moderate in 15 and 20 DPA fibers and roots, and low in flowers and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید