نتایج جستجو برای: path file

تعداد نتایج: 195250  

2010
Constandinos X. Mavromoustakis

This work proposes a scheme which takes into account the k-hop mobility-based outsourcing strategy where the mobile devices are using a sequential scheme for caching requested high ranked resources onto neighboring nodes in the k-hop path in order to be available during a request. The scheme takes into consideration the relay epoch and the mobility aspects of each node in the k-hop path in orde...

ژورنال: :مجله دانشگاه علوم پزشکی شهید صدوقی یزد 0
علیرضا قاطع ar ghate private practice, yazdمطب خصوصی.یزد.ایران مهرشید بزرگ نیا m bozorgnia shahid sadoughi university of medical sciences, yazdدانشگاه علوم پزشکی و خدمات بهداشتی درمانی شهید صدوقی یزد سید حسین طباطبایی h tabatabai dental schoolدانشگاه علوم پزشکی و خدمات بهداشتی درمانی شهید صدوقی یزد مهدی تبریزی زاده m tabrizizadeh dental schoolدانشگاه علوم پزشکی و خدمات بهداشتی درمانی شهید صدوقی یزد سارا جان نژاد s jannezhad university of medical sciences, yazd, iran.ابتدای بلوار دانشگاه علوم پزشکی و خدمات بهداشتی درمانی شهید صدوقی یزدفجر، دانشکده دندانپزشکی یزد

مقدمه: یکی از مراحل مهم درمان ریشه حذف میکروارگانیسم های کانال به منظور شکل دهی و تمیزکردن آن بوسیله انواع وسایل دستی و موتوری است. هدف از این مطالعه مقایسه میزان دبری باقی مانده در کانال پس از استفاده از دو سیستم روتاری(twisted file و(flexmaster با استریومیکروسکوپ است. روش بررسی: در این مطالعه آزمایشگاهی از 60 دندان پرمولار کشیده شده انسان استفاده شد. پس از تقسیم دندان ها به دو گروه، شکل دهی و...

Journal: :Electronics 2022

State-of-the-art modern microprocessor and domain-specific accelerator designs are dominated by data-paths composed of regular structures, also known as bit-slices. Random logic placement routing techniques may not result in an optimal layout for these data-path-dominated designs. As a result, implementation tools such Cadence’s Innovus include Structured Data-Path (SDP) feature that allows dat...

2000
Mark Allman Jim Griner

This paper provides a preliminary investigation into the impact a link with changing propagation delay has on the performance of TCP file transfers. We investigate over a dozen different variable delay patterns, based on spacecraft movement. We highlight the performance impact of such variability, paying close attention to TCP’s retransmission timer, which is based on the observed round-trip ti...

2012
Bob Carpenter Breck Baldwin

Externalizable.compileTo(classifier,file); @SuppressWarnings("unchecked") ConditionalClassifier compiledClassifier = (ConditionalClassifier) AbstractExternalizable.readObject(file); file.delete(); The static utility method compileTo() from Java’s class AbstractExternalizable class (in the util package) is used to do the writing. This could also be done through LingPi...

Journal: :دانش و پژوهش در آموزش زبان انگلیسی 0
بهنام قاسمی behnam ghasemi حمید رضا حق وردی hamid reza haghverdi

textbooks play a pivotal role in language learning classrooms. the problem is that among a wide range of textbooks in market which is appropriate for a specific classroom and a group of learners. in order to evaluate elt textbooks theorists and writers have offered different kinds of evaluative frameworks based on a number of principles and criteria. this study evaluates a series of elt textboo...

Journal: :International journal of applied dental sciences 2023

A glide path file may contribute to extruding contaminated debris during the first treatment phase. Using rotary techniques rather than manually operated instruments is thought decrease amount of extruded and hence post-operative pain levels. Aim: To compare effect using Neoniti GPS rotating in comparison manual stainless-steel K-files on pain, asymptomatic nonvital mandibular molars. Methods: ...

2013
Yanhua Li Zhi-Li Zhang

This documents provides numerical illustration results obtained by applying the routing continuum theory in two synthetic networks and a real network topology. Moreover, besides the generalizations of the mixed L1and L2-norm network flow optimization problem discussed in the main file, in this document, we discuss one more application in analyzing network robustness, by introducing the generali...

Journal: :Computer Networks and ISDN Systems 1995
Dave J. Beckett

Busy Internet archives generate large logs for each access method being used. These raw log files can be difficult to process and to search. This paper describes a system for reading these growing logs, a combined log file format into which they are rewritten and a system that automates this building and integration for multiple access methods. Automated summarizing of the information is also p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید