Search results for "Cryptography"
showing 10 items of 657 documents
ChemInform Abstract: 3-Diazopyrroles: Key Intermediates in the Synthesis of Antineoplastic Agents
1989
Synthesis of 5‐Fluorocytosine Using 2‐Cyano‐2‐fluoroethenolate as a Key Intermediate
2019
Liquid chromatography--its development and key role in life science applications.
2010
Liquid chromatographic methods cover the broadest range of appli- cations imaginable today. Nowhere is this more evident and relevant than in the life sciences, where identification of target substances relevant in disease mechanisms is performed down to the femtomole level. On the other hand, purification of therapeutic drugs on a multi- ton scale is performed by process LC. The complexity and abundance range of biological systems in combination with the extreme purity requirements for drug manufacturing are the challenges that can be mastered today by chromatography, after more than a century of research and development. However, significant improvement is still required for a better unde…
ChemInform Abstract: Liquid Chromatography - Its Development and Key Role in Life Science Applications
2010
Liquid chromatographic methods cover the broadest range of appli- cations imaginable today. Nowhere is this more evident and relevant than in the life sciences, where identification of target substances relevant in disease mechanisms is performed down to the femtomole level. On the other hand, purification of therapeutic drugs on a multi- ton scale is performed by process LC. The complexity and abundance range of biological systems in combination with the extreme purity requirements for drug manufacturing are the challenges that can be mastered today by chromatography, after more than a century of research and development. However, significant improvement is still required for a better unde…
Identification of Key Gin Aroma Compounds
2014
Potential impact aroma compounds of gin have been identified using Gas Chromatogry Olfactometry Mass-Spectrometry (GC-O-MS). In order to select some of them for a recombination study, we developed a specific procedure. Instead of only choosing the compounds on criteria such as their odor quality or their odor activity values, we also used physico-chemical parameters and information on their botanical origin. Data were organized in blocks homogeneous in terms of parameter type. Different statistical treatments were used in order to classify the compounds either by analyzing the parameters altogether or separately block by block.
VoiP performance analysis in IEEE802.16 networks
2012
WiMAX, as known as IEEE standard 802.16, is a wide range broadband wireless access network which has a significant good support for the quality of service. According to IEEE standard 802.16e WiMAX has support also for mobility. One of the key advantages of the WiMAX network is the possibility to assign QoS parameters as connection based. A good example of traffic type having strict QoS demands is VoIP. VoIP will probably be a killer application in the future's broadband wireless networks because of its cost efficiency compared to circuit switched networks. In this paper, we analyze by extensive simulations how QoS is applied per connection, especially for the VoIP connection.
Key pedagogical principles and their major obstacles as perceived by comprehensive school teachers
2011
The general pedagogical knowledge of teachers is not often investigated in comparison to content knowledge and pedagogical content knowledge. In this article, a more comprehensive outlook on teache...
Premature diagnostic closure: An avoidable type of error
2013
A well-developed clinical interview makes it possible to adequately focus the diagnosis. However, cognitive psychology shows that mistakes are made when the persons face complex problems, such as those faced when making a diagnosis, especially if time or resources are limited. The main cause of failures in clinical reasoning is using "cognitive shortcuts". Among them, premature closure is a key factor triggering a diagnostic error. Cognitive errors are predictable and thus, it is possible to learn strategies to reduce or avoid them. Knowing the main features of cognitive shortcuts and identifying those automatically used is the first step towards preventing errors or minimizing their conseq…
Toll-quality digital secraphone
2002
This paper describes the design and performance of a secraphone that, when plugged between any conventional telephone set and the public telephone network, protects the speech information travelling through the PSTN. The device has a transparent operating mode that does not alter the signal and a secure mode, accessed upon request of any of the speakers, that encrypts the speech with digital techniques, assuring privacy against unwanted listeners. At the transmission branch, voice is sampled, coded with a CELP scheme at 9600 bps (with a slow mode at 7200 bps), encrypted with a proprietary algorithm and interfaced to the line with a V.32 modem chip set. The keys for encryption are establishe…
Gödel and the Blind Watchmaker
2015
While accepting that contingency is key to biological evolution, we wonder how much need there is for it. It is extremely difficult to talk about trends in evolution, but the fact remains that they are found here and there when evolutionary experiments are repeated. But we should ask, for example, whether there is an unavoidable tendency of life towards progressive complexity . This chapter deals with certain theoretical considerations from Logic and Computing on the conditions necessary to formulate a predictive evolutionary theory .