نتایج جستجو برای: standard curve
تعداد نتایج: 632393 فیلتر نتایج به سال:
v. dannon showed that spherical curves in e4 can be given by frenet-like equations, and he thengave an integral characterization for spherical curves in e4 . in this paper, lorentzian spherical timelike andspacelike curves in the space time 41 r are shown to be given by frenet-like equations of timelike andspacelike curves in the euclidean space e3 and the minkowski 3-space 31 r . thus, finding...
UNLABELLED : Lu and Elston have recently proposed a procedure for developing optimal receiver operating characteristic curves that maximize the area under a receiver operating characteristic curve in the setting of a predictive genetic test. The method requires only summary data, not individual level genetic data. In an era of increased data sharing, we investigate the performance of this algor...
The "Gammaflow" automated assay concept of Brooker et al. (Science 194:270, 1976) has been adapted to the assay for urinary cyclic AMP in patients' samples on the now commercially available Squibb Gamma-FloTM system, a totally automated continuous-flow immunoassay instrument. The instrument aspirates the unknown sample, combines it with radioligand and specific antiserum, incubates the mixture,...
Although recombinase polymerase amplification (RPA) has many advantages for the detection of pathogenic nucleic acids in point-of-care applications, RPA has not yet been applied for has not yet been implemented to quantify sample concentration using a standard curve. Here we describe a real-time RPA assay with an internal positive control and an algorithm that analyzes the real-time fluorescenc...
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI standard, and was accepted in 2000 as IEEE and NIST standards. It was also accepted in 1998 as an ISO standard, and is under consideration for inclusion in some other ISO standards. Unlike the ordinary discrete logarithm problem and t...
This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a vulnerability in some curves that are not publicly known to be vulnerable. This cost includes the cost of exploiting the vulnerability, but also the initial cost of computing a curve suitable for sabo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید