Cracking pattern of tissue slices induced by external extension provides useful diagnostic information
نویسندگان
چکیده
منابع مشابه
suppression of coke formation in thermal cracking by coke inhibitors
the main purpose of this research was to:1.develop a coking model for thermal cracking of naphtha.2.study coke inhibition methods using different coke inhibitors.developing a coking model in naphtha cracking reactors requires a suitable model of the thermal cracking reactor based on a reliable kinetic model.to obtain reliable results all these models shall be solved simultaneously.for this pu...
15 صفحه اولSome Useful Information about Micropropagation
This review article investigates a comprehensive description of the factors, methods, strategies, approaches and prerequisites influencing in vitro micropaopagation and the amount of their use across the world. The findings presented here are the results of the study of several hundred papers published all over the world. Tissue culture techniques are routinely used for micropropagation. Enhanc...
متن کاملFunctors Induced by Cauchy Extension of C$^ast$-algebras
In this paper, we give three functors $mathfrak{P}$, $[cdot]_K$ and $mathfrak{F}$ on the category of C$^ast$-algebras. The functor $mathfrak{P}$ assigns to each C$^ast$-algebra $mathcal{A}$ a pre-C$^ast$-algebra $mathfrak{P}(mathcal{A})$ with completion $[mathcal{A}]_K$. The functor $[cdot]_K$ assigns to each C$^ast$-algebra $mathcal{A}$ the Cauchy extension $[mathcal{A}]_K$ of $mathcal{A}$ by ...
متن کاملUtilization of Information and Communication Technologies (ICTs) by Agricultural Extension Workers in Niger State, Nigeria
The study examined the utilization of information and communication technologies by agricultural extension workers in Niger State, Nigeria. To achieve the study objective, 206 respondents were proportionately and randomly selected from the three agricultural zones in the State through multi-stage sampling technique. Validated questionnaire with reliability coefficient of 0.81 was used to collec...
متن کاملCracking Android Pattern Lock in Five Attempts
Pattern lock is widely used as a mechanism for authentication and authorization on Android devices. This paper presents a novel video-based attack to reconstruct Android lock patterns from video footage filmed using a mobile phone camera. Unlike prior attacks on pattern lock, our approach does not require the video to capture any content displayed on the screen. Instead, we employ a computer vi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific Reports
سال: 2018
ISSN: 2045-2322
DOI: 10.1038/s41598-018-30662-9