Showing 181 - 200 results of 7,187 for search '"Copy protection', query time: 0.19s Refine Results
  1. 181
  2. 182

    Policy Debate | Humanitarian Protection in the Midst of Civil War: Lessons from Sri Lanka by Norah Niland, John Holmes, Miriam Bradley

    Published 2014-05-01
    “…Authored by Norah Niland, the initial paper addresses the protection dimension of humanitarian action in the Sri Lankan Civil War. …”
    Get full text
    Article
  3. 183
  4. 184
  5. 185

    Gamma-Aminobutyrate Transaminase Protects against Lipid Overload-Triggered Cardiac Injury in Mice by Mengxiao Zhang, Huiting Zhong, Ting Cao, Yifan Huang, Xiaoyun Ji, Guo-Chang Fan, Tianqing Peng

    Published 2022-02-01
    “…With the inhibition of ABAT’s GABA catabolic activity, the protective effects of ABAT remained unchanged in palmitate-induced cardiomyocytes. …”
    Get full text
    Article
  6. 186

    Disseminating findings from the Data Analysis with Privacy Protection for Epidemiological Research (DAPPER) workshop by Rebecca Wilson, Paul Burton, Innes Asher, Kim Carter, Adriana Castelli, David Cumin, Chris Evelo, Lesley Stewart, Kelvin Tsoi, Emma White

    Published 2017-04-01
    “…Data science groups across the world are exploring privacy-protected approaches to analysing microdata without having to physically share the data. …”
    Get full text
    Article
  7. 187
  8. 188

    Influence of genetic copy number variants of the human GLUT3 glucose transporter gene SLC2A3 on protein expression, glycolysis and rheumatoid arthritis risk: A genetic replication... by Kim R. Simpfendorfer, Wentian Li, Andrew Shih, Hongxiu Wen, Harini P. Kothari, Edward A. Einsidler, Arthur Wuster, Julie Hunkapiller, Timothy W. Behrens, Robert R. Graham, Michael J. Townsend, Doron M. Behar, Rui Hu, Elliott Greenspan, Peter K. Gregersen

    Published 2019-06-01
    “…Here we aim to perform functional analysis of GLUT3 copy number variants in immune cells, and test the reported protective association of the GLUT3 copy number variants for rheumatoid arthritis in a genetic replication study. …”
    Get full text
    Article
  9. 189

    AN ALGORITHM OF MARKING IMAGES BASED ON THE VISUAL CRYPTOGRAPHY FOR PROTECTING FROM UNCONFIDENTIALITY INFORMATION DISTRIBUTION by A. A. Boriskevich

    Published 2019-06-01
    “…An algorithm of marking image protecting from copying and illegal distribution of information based on the visual cryptography principles, representing an original image in form of the weighted binary plane set and binary marking mask in form of two shadow image is proposed. …”
    Get full text
    Article
  10. 190

    Intracerebral haemorrhage in Down syndrome: protected or predisposed? [version 1; referees: 2 approved] by Lewis Buss, Elizabeth Fisher, John Hardy, Dean Nizetic, Jurgen Groet, Laura Pulford, André Strydom

    Published 2016-05-01
    “…The amyloid precursor protein (APP) gene lies on chromosome 21 and its presence in three copies in DS is thought to largely drive the early onset AD. …”
    Get full text
    Article
  11. 191

    An algorithm for using a cross-platform mobile application to protect information in cloud storage by A. R. Gazizov

    Published 2022-08-01
    “…The aim of the study is to develop an algorithm for using a cross-platform mobile application to protect information in the "cloud storage" of IS.Method. …”
    Get full text
    Article
  12. 192

    Dendrimeric peptides can confer protection against foot-and-mouth disease virus in cattle. by Ivana Soria, Valeria Quattrocchi, Cecilia Langellotti, Mariela Gammella, Sebastian Digiacomo, Beatriz Garcia de la Torre, David Andreu, Maria Montoya, Francisco Sobrino, Esther Blanco, Patricia Zamorano

    Published 2017-01-01
    “…A synthetic vaccine candidate consisting of dendrimeric peptides harbouring two copies of a B-epitope [VP1(136-154)] linked to a T-cell epitope [3A(21-35)] of FMDV confers protection to type O FMDV challenge in pigs. …”
    Get full text
    Article
  13. 193

    Brain Correlates of Human Leukocyte Antigen (HLA) Protection in Gulf War Illness (GWI) by Lisa M. James, Brian E. Engdahl, Arthur C. Leuthold, Apostolos P. Georgopoulos

    Published 2016-11-01
    “…A high-resolution HLA genotyping determined the number of copies, k, of the 6 protective alleles above in each participant. …”
    Get full text
    Article
  14. 194

    Well-known Mark Overseas Legal Protection and Local Brands in Trademark Rights Violations by okky andaniswari

    Published 2019-12-01
    “…However, brands are very vulnerable to being copied by irresponsible parties. The imitation of the brand has an impact on material and non-material losses. …”
    Get full text
    Article
  15. 195

    A robust computational DRM framework for protecting multimedia contents using AES and ECC by Heba El-Rahman Hassan, Mohamed Tahoun, Gh.S. ElTaweel

    Published 2020-06-01
    “…This paper presents a robust framework that protects the copyright property where only the authorized users legally use the data and prevents the illegal using or copying of data. …”
    Get full text
    Article
  16. 196

    PROTECTION OF CHILDREN’S RIGHTS DURING IMPLEMENTATION OF GUARANTEES IN EXECUTIVE PROCEEDINGS: THEORETICAL AND LEGAL STUDY by Natalya Stepanenko, Danylo Kubrak

    Published 2024-01-01
    “…Through legislative analysis and practical examination, the article asserts that safeguarding children's rights in enforcement proceedings unfolds in two primary facets: protection of property rights and protection of personal non-property rights. …”
    Get full text
    Article
  17. 197

    PROTECTION OF AN ELECTRONIC DOCUMENT USING A CONSOLIDATED APPROACH TO THE APPLICATION OF ELECTRONIC DIGITAL SIGNATURE by Yaroslav Kornaga, Vyacheslav Garmatin, Alona Hryshko, Alona Maksimyuk, Vadym Gasanov

    Published 2019-09-01
    “…The problem of keeping electronic documents from being copied, modified, and forgery requires specific approaches and methods of protection for its solution. …”
    Get full text
    Article
  18. 198

    Perspectives of consumers, licensed moneylenders and regulator on consumer protection in the moneylending transaction system in the Klang Valley, Malaysia by Pajen Singh, Daljit Kaur

    Published 2021
    “…Nevertheless, consumer protection in moneylending transactions is hampered by consumers’ weak self-protection in exercising their rights and responsibilities coupled with the poor self-regulation of moneylenders in adhering to the rules and regulations. …”
    Get full text
    Thesis
  19. 199
  20. 200