搜索结果: 1-15 共查到“Check-in”相关记录55条 . 查询时间(0.203 秒)


The immune system does battle in the intestines to keep bacteria in check(图)
Research Infectious Diseases Veterinary Medicine
2023/6/29
AUTOMATIC RAIL EXTRACTION AND CELARANCE CHECK WITH A POINT CLOUD CAPTURED BY MLS IN A RAILWAY
MLS Railway Rail Extraction Clearance Check
2018/6/4
Recently, MLS (Mobile Laser Scanning) has been successfully used in a road maintenance. In this paper, we present the application of MLS for the inspection of clearance along railway tracks of West Ja...
Pilot Experiment in Chickens Challenged with Campylobacter jejuni CCM6191 Administered Enterocin M-producing Probiotic Strain Enterococcus faecium CCM8558 To Check Its Protective Effect
enterococci effect chick microbiota physiological parameters Campylobacter challenge
2018/3/5
Campylobacter jejuni is one of the most common food-borne pathogens and chickens are the main source of
these bacteria. Enterococcus faecium AL41, enterocin M-producing strain (deponed to the Czech C...
Zero-Knowledge Password Policy Check from Lattices
zero-knowledge password policy check set membership proof lattice-based cryptography
2017/9/13
Passwords are ubiquitous and most commonly used to authenticate users when logging into online services. Using high entropy passwords is critical to prevent unauthorized access and password policies e...
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data
reachability location privacy homomorphic encryption
2017/8/2
Reachability, which answers whether one person is reachable from another through a sequence of contacts within a period of time, is of great importance in many domains such as social behavior analysis...
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
ANSI X9.24-1:2009 key check value ISO/IEC 9797-1:2011
2016/1/25
ANSI X9.24-1:2009 specifies the key check value, which is used to verify the integrity
of the blockcipher key. This value is defined as the most significant bits of the ciphertext of the zero
block,...
Efficient Interval Check in the Presence of Malicious Adversaries
private interval check secure integer comparison malicious model
2016/1/7
We consider the following problem: Assuming that Alice and
Bob have an integer interval [a, e] and an integer b respectively, for a
commitment c to b, Alice and Bob jointly check whether b is within...
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
side-channel analysis fault attacks parity check countermeasure
2015/12/23
In this paper we study a parity check based countermeasure proposed by Chen
et al. that thwarts their attack by detecting byte fault injection during the AES key schedule
process.
A Software Package to Check the Aerial Frames Blocks from GPS/IMU-Assisted Cameras
Aerial photogrammetry Visualization Digital photogrammetry
2015/12/3
Verifying the correspondence between planned flight lines and actual ones just after the mission is critical to speed up internal quality controls as well as the external ones performed by the custome...
CRISPR-Cas9 gene editing:check three times,cut once
CRISPR-Cas9 gene editing check three times cut once
2015/12/7
Two new studies from UC Berkeley should give scientists who use CRISPR-Cas9 for genome engineering greater confidence that they won’t inadvertently edit the wrong DNA.The gene editing technique, creat...
Radon, water chemistry and pollution check by volatile organic compounds in springs around Popocatepetl volcano, Mexic
soil radon water chemistry volcanic activity
2015/9/10
Popocatepetl volcano is a high-risk active volcano in Central Mexico where the highest population density in the country
is settled. Radon in the soil and groundwater together with water chemistry fr...
Analysis of seismic noise to check the mechanical isolation of a medical device
Seismic noise noise acquisition anthropogenic sources Spectral Ratio Analyses Magnetoencephalography
2015/8/27
We have investigated the mechanical response of a magnetically shielded room that hosts a magnetoencephalography system that is subject to external vibrations. This is a superconducting quantum interf...
Plagiarism Detection:Keeping Check on Misuse of Intellectual Property
Intellectual Property Rights Intellectual Property Thefts
2015/7/21
Today, Plagiarism has become a menace. Every journal editor or conference organizers has to deal with this problem. Simply Copying or rephrasing of text without giving due credit to the original autho...
Each summer, Greenland’s ice sheet — the world’s second-largest expanse of ice, measuring three times the size of Texas — begins to melt. Pockets of melting ice form hundreds of large, “supraglacial” ...