Search results for "Cryptography"

showing 10 items of 657 documents

ChemInform Abstract: 3-Diazopyrroles: Key Intermediates in the Synthesis of Antineoplastic Agents

1989

ChemistryKey (cryptography)General MedicineCombinatorial chemistryChemInform
researchProduct

Synthesis of 5‐Fluorocytosine Using 2‐Cyano‐2‐fluoroethenolate as a Key Intermediate

2019

ChemistryOrganic ChemistryKey (cryptography)Physical and Theoretical ChemistryCombinatorial chemistryNucleobaseEuropean Journal of Organic Chemistry
researchProduct

Liquid chromatography--its development and key role in life science applications.

2010

Liquid chromatographic methods cover the broadest range of appli- cations imaginable today. Nowhere is this more evident and relevant than in the life sciences, where identification of target substances relevant in disease mechanisms is performed down to the femtomole level. On the other hand, purification of therapeutic drugs on a multi- ton scale is performed by process LC. The complexity and abundance range of biological systems in combination with the extreme purity requirements for drug manufacturing are the challenges that can be mastered today by chromatography, after more than a century of research and development. However, significant improvement is still required for a better unde…

ChromatographyChemistryProcess (engineering)Scale (chemistry)Disease mechanismsGeneral ChemistryCatalysisBiological Science DisciplinesDiagnosisKey (cryptography)HumansMetabolomicsDiseaseChromatography LiquidAngewandte Chemie (International ed. in English)
researchProduct

ChemInform Abstract: Liquid Chromatography - Its Development and Key Role in Life Science Applications

2010

Liquid chromatographic methods cover the broadest range of appli- cations imaginable today. Nowhere is this more evident and relevant than in the life sciences, where identification of target substances relevant in disease mechanisms is performed down to the femtomole level. On the other hand, purification of therapeutic drugs on a multi- ton scale is performed by process LC. The complexity and abundance range of biological systems in combination with the extreme purity requirements for drug manufacturing are the challenges that can be mastered today by chromatography, after more than a century of research and development. However, significant improvement is still required for a better unde…

ChromatographyChemistryProcess (engineering)Scale (chemistry)Disease mechanismsKey (cryptography)General MedicineChemInform
researchProduct

Identification of Key Gin Aroma Compounds

2014

Potential impact aroma compounds of gin have been identified using Gas Chromatogry Olfactometry Mass-Spectrometry (GC-O-MS). In order to select some of them for a recombination study, we developed a specific procedure. Instead of only choosing the compounds on criteria such as their odor quality or their odor activity values, we also used physico-chemical parameters and information on their botanical origin. Data were organized in blocks homogeneous in terms of parameter type. Different statistical treatments were used in order to classify the compounds either by analyzing the parameters altogether or separately block by block.

ChromatographybiologyChemistrybusiness.industryPattern recognitionbiology.organism_classificationChemometricsIdentification (information)OdorOlfactometryKey (cryptography)Artificial intelligencebusinessAromaSelection (genetic algorithm)Block (data storage)
researchProduct

VoiP performance analysis in IEEE802.16 networks

2012

WiMAX, as known as IEEE standard 802.16, is a wide range broadband wireless access network which has a significant good support for the quality of service. According to IEEE standard 802.16e WiMAX has support also for mobility. One of the key advantages of the WiMAX network is the possibility to assign QoS parameters as connection based. A good example of traffic type having strict QoS demands is VoIP. VoIP will probably be a killer application in the future's broadband wireless networks because of its cost efficiency compared to circuit switched networks. In this paper, we analyze by extensive simulations how QoS is applied per connection, especially for the VoIP connection.

Circuit switchingVoice over IPCost efficiencyWireless broadbandbusiness.industryComputer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSKey (cryptography)Mobile communications over IPbusinessWiMAXComputer networkProceedings of the 10th ACM international symposium on Mobility management and wireless access
researchProduct

Key pedagogical principles and their major obstacles as perceived by comprehensive school teachers

2011

The general pedagogical knowledge of teachers is not often investigated in comparison to content knowledge and pedagogical content knowledge. In this article, a more comprehensive outlook on teache...

Class sizeComprehensive schoolArts and Humanities (miscellaneous)Age differencesTeaching methodPedagogyKey (cryptography)Mathematics educationInterpersonal communicationContent knowledgePsychologyEducationLikert scaleTeachers and Teaching
researchProduct

Premature diagnostic closure: An avoidable type of error

2013

A well-developed clinical interview makes it possible to adequately focus the diagnosis. However, cognitive psychology shows that mistakes are made when the persons face complex problems, such as those faced when making a diagnosis, especially if time or resources are limited. The main cause of failures in clinical reasoning is using "cognitive shortcuts". Among them, premature closure is a key factor triggering a diagnostic error. Cognitive errors are predictable and thus, it is possible to learn strategies to reduce or avoid them. Knowing the main features of cognitive shortcuts and identifying those automatically used is the first step towards preventing errors or minimizing their conseq…

Clinical interviewPremature ClosureRisk analysis (engineering)business.industryKey (cryptography)Clinical reasoningMedicineCognitionGeneral MedicineClosure (psychology)businessComplex problemsCognitive errorRevista Clínica Española (English Edition)
researchProduct

Toll-quality digital secraphone

2002

This paper describes the design and performance of a secraphone that, when plugged between any conventional telephone set and the public telephone network, protects the speech information travelling through the PSTN. The device has a transparent operating mode that does not alter the signal and a secure mode, accessed upon request of any of the speakers, that encrypts the speech with digital techniques, assuring privacy against unwanted listeners. At the transmission branch, voice is sampled, coded with a CELP scheme at 9600 bps (with a slow mode at 7200 bps), encrypted with a proprietary algorithm and interfaced to the line with a V.32 modem chip set. The keys for encryption are establishe…

Code-excited linear predictionPublic-key cryptographyTelephone networkComputer sciencebusiness.industrySpeech codingCryptographyTelephonyEncryptionbusinessLinear predictive codingComputer networkProceedings of 8th Mediterranean Electrotechnical Conference on Industrial Applications in Power Systems, Computer Science and Telecommunications (MELECON 96)
researchProduct

Gödel and the Blind Watchmaker

2015

While accepting that contingency is key to biological evolution, we wonder how much need there is for it. It is extremely difficult to talk about trends in evolution, but the fact remains that they are found here and there when evolutionary experiments are repeated. But we should ask, for example, whether there is an unavoidable tendency of life towards progressive complexity . This chapter deals with certain theoretical considerations from Logic and Computing on the conditions necessary to formulate a predictive evolutionary theory .

Cognitive scienceComputer scienceBiological evolutionWonderTuring machinesymbols.namesakeSynthetic biologysymbolsKey (cryptography)GödelContingencycomputerEvolutionary theorycomputer.programming_language
researchProduct