نتایج جستجو برای: false requirement

تعداد نتایج: 233291  

Journal: :iranian journal of applied animal science 2015
i. hajkhodadadi h. moravej m. shivazad h. ghasemi a. zareh-shahneh

the present research was conducted to estimate the dietary lysine (lys) requirement of growing female quail base on performance and carcass constitutes at 24 to 42 d of age. a dose-response diet mainly based on corn, corn gluten and soybean meal was used. lys content was minimized in dose-response diet (10 g/kg) while assuring the minimum levels of all other essential amino acids in a manner th...

Journal: :galen medical journal 0
scott reza jafarian kerman student scientific research center tehran university of medical sciences, tehran

0

Journal: :Clinical Studies & Medical Case Reports 2017

2015
Ines Elleuch Fatma Abdelkefi Mohamed Siala

This chapter provides a deep insight into multiple antenna eigenvalue-based spectrum sensing algorithms from a complexity perspective. A review of eigenvalue-based spectrum-sensing algorithms is provided. The chapter presents a finite computational complexity analysis in terms of Floating Point Operations (flop) and a comparison of the Maximum-to-Minimum Eigenvalue (MME) detector and a simplifi...

Journal: :IEEE Trans. Parallel Distrib. Syst. 2003
Mahmut T. Kandemir Alok N. Choudhary J. Ramanujam Prithviraj Banerjee

The performance of applications on large shared-memory multiprocessors with coherent caches depends on the interaction between the granularity of data sharing, the size of the coherence unit, and the spatial locality exhibited by the applications, in addition to the amount of parallelism in the applications. Large coherence units are helpful in exploiting spatial locality, but worsen the effect...

Journal: :Notre Dame Journal of Formal Logic 1978

Journal: :IEEE Transactions on Intelligent Transportation Systems 2022

Connected vehicle (CV) systems are subject to potential cyber attacks because of increasing connectivity between its different components, such as vehicles, roadside infrastructure, and traffic management centers. However, it is a challenge detect security threats in real-time develop appropriate or effective countermeasures for CV system the dynamic behavior attacks, high computational power r...

امامی, سیدعلی, فرهود, امیررضا, مرتضوی, سیدمحمد‌جواد, گنجعلی خان حاکمی, علی, گنجی, مسعود,

Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal" mso-tsty...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید