Sentences with phrase «identified by other methods»

Of these, 118 have not previously been identified by other methods.

Not exact matches

Adjusted Net Income is defined as net income excluding (i) franchise agreement amortization, which is a non-cash expense arising as a result of acquisition accounting that may hinder the comparability of our operating results to our industry peers, (ii) amortization of deferred financing costs and debt issuance discount, a non-cash component of interest expense, and (gains) losses on early extinguishment of debt, which are non-cash charges that vary by the timing, terms and size of debt financing transactions, (iii)(income) loss from equity method investments, net of cash distributions received from equity method investments, (iv) other operating expenses (income), net, and (v) other specifically identified costs associated with non-recurring projects.
While the UniFrac analyses we performed suggest independent associations between microbiome composition and both delivery mode and feeding method, the substantial overlap between the communities defined by both factors suggests that there are other important drivers of microbiome community composition that remain to be identified in future analyses.
Other researchers have used indirect methods to study the use of projectiles, such as analyzing impact fractures on ancient stone points or identifying traces left by hafting on the points.
The team led by John Hogenesch, PhD, a professor of Systems Pharmacology and Translational Therapeutics in the Perelman School of Medicine at University of Pennsylvania and Jason DeBruyne, PhD, a former postdoctoral fellow in the Hogenesch lab and now an assistant professor at Morehouse School of Medicine in Atlanta, applied their new method to identifying other clock partners that target a multipurpose cell nucleus receptor for disposal.
METRICS will work with other researchers to identify and encourage the best research practices, ensuring that well - established statistical principles and other methods, endorsed by all researchers but too often ignored in practice, are widely adopted.
In other words, a program trained with this method should be able to identify the same speaker in two different phone calls, one placed by landline, for example, and the other by cell phone.
Collins already had developed a method to identify ancient species by differences in the amino acid sequences of collagen and other proteins preserved in fossils.
After denouncing the «best practices» identified by the authors of Surpassing Shanghai on the basis of the methods we used, Greene appears to realize that his war on «best practices» has led him to inadvertently attack the kinds of studies done by people whose policy prescriptions he prefers, like Ludger Woessmann and Eric Hanushek, who have done well - regarded statistical analyses of survey data from OECD - PISA and other sources.
The other method is to identify the preview content within the package document, allowing the ebookstore or reading system to generate the preview (whether as a standalone publication in the case of an ebookstore, or by limiting access only to the specified preview content in the case of a reading system).
In this 18 - month study funded by Maddie's Fund, researchers hope to learn now many cats will test negative within six months after a positive test, to examine the accuracy of and agreement between different testing methods, to understand what can be learned from discordant test results, and potentially to identify why some cats overcome the virus and others don't.
Thus, the mail represents a relatively reliable means of communication, and while other means of contacting owners are encouraged, shelters should be required to serve notice to identified owners by mail, regardless of other methods of communication that might be attempted.
I'm not advocating overly broad regulation like Sarbanes - Oxley — rather I like to see basic rules governing disclosure of data and methods that will ensure that errors, omissions or deception can be easily identified by other scientists.
I try to answer all such queries, because the scientific method requires that anyone who asserts a result must be willing to explain how he got there, so that others can replicate his work by following his route and identifying any errors.
What methods are there for limiting or eliminating the need for legal services, through consumer protection, licensing, standard - setting and pro-active regulation, or other innovations identified by the research?
Fortunately, there are methods by which a forensic approach can be used to identify IP addresses and other information that can identify to a reasonable degree the source or author of the posting, and to determine its authenticity.
One way a covered entity may demonstrate that it has met the standard is if a person with appropriate knowledge and experience applying generally accepted statistical and scientific principles and methods for rendering information not individually identifiable makes a determination that the risk is very small that the information could be used, either by itself or in combination with other available information, by anticipated recipients to identify a subject of the information.
(i) Applying such principles and methods, determines that the risk is very small that the information could be used, alone or in combination with other reasonably available information, by an anticipated recipient to identify an individual who is a subject of the information; and
If an imposter obtains key personal information such as a Social Security or Driver's License number, or other method of identifying an insured person in order to impersonate or obtain credit, merchandise or services in the insured person's name, the Outreach plans provide coverage for up to $ 500 for the reasonable, customary and necessary costs incurred by the insured for: re-filing a loan or other credit application that is rejected solely as a result of the stolen identity event; notarization of legal documents, long - distance telephone calls, and postage that has resulted solely as a result of reporting, amending and / or rectifying records as a result of the stolen identity event; up to three credit reports obtained within one year of the insured person's knowledge of the stolen identity event; and stop payment orders placed on missing or unauthorized checks as a result of the stolen identity event.
If an imposter obtains key personal information such as a Social Security or Driver's License number, or other method of identifying an insured person in order to impersonate or obtain credit, merchandise or services in the insured person's name, thePatriot Platinum plans provide coverage for up to $ 500 for the reasonable, customary and necessary costs incurred by the insured for: re-filing a loan or other credit application that is rejected solely as a result of the stolen identity event; notarization of legal documents, long - distance telephone calls, and postage that has resulted solely as a result of reporting, amending and / or rectifying records as a result of the stolen identity event; up to three credit reports obtained within one year of the insured person's knowledge of the stolen identity event; and stop payment orders placed on missing or unauthorized checks as a result of the stolen identity event.
If an imposter obtains key personal information such as a Social Security or Driver's License number, or other method of identifying an insured person in order impersonate or obtain credit, merchandise or services in the insured person's name, the Patriot Multi-Trip plans provide coverage for up to $ 500 for the reasonable, customary and necessary costs incurred by the insured for: re-filing a loan or other credit application that is rejected solely as a result of the stolen indentity event; notarization of legal documents, long distance telephone calls, and postage that has resulted solely as a result of reporting, amending and / or rectifying records as a result of the stolen identity event; up to three credit reports obtained within one year of the insured person's knowledge of the stolen identity event; and stop payment orders placed on missing or unauthorized checks as a result of the stolen identity event.
If an imposter obtains key personal information such as a Social Security or Driver's License number, or other method of identifying an insured person in order to impersonate or obtain credit, merchandise or services in the insured person's name, the Patriot GoTravel plans provide coverage up to $ 500 for the reasonable, customary and necessary costs incurred by the insured for: re-filing a loan or other credit application that is rejected solely as a result of the stolen identity event; notarization of legal documents, long dis - tance telephone calls, and postage that has resulted solely as a result of reporting, amending and / or rectifying records as a result of the stolen identity event; up to three credit reports obtained within one year of the insured person's knowledge of the stolen identity event; and stop payment orders placed on missing or unauthorized checks as a result of the stolen identity event.
Self - assessment tools: Start by using the worksheets in our Career Strategy Workbook to identify interests, values and skills, and follow up with an advisor to learn about other assessment methods.
a b c d e f g h i j k l m n o p q r s t u v w x y z