نتایج جستجو برای: investment cast

تعداد نتایج: 95293  

Journal: :journal of dentistry, tehran university of medical sciences 0
z. khamverdi assistant professor, department of operative dentistry, school of dentistry, hamadan university of m sh. kasraei assistant professor, department of operative dentistry, school of dentistry and member of dental res

objective: there is no definitive data on the strength of glass fiber and cast posts with different length. this in vitro study was designed to investigate and compare the effect of length on the retentive strength of glass fiber and cast posts. materials and methods: sixty recently extracted intact maxillary canine teeth were cut 1mm above the cej. the specimens were endodontically treated and...

2012
J Deceuninck JC Bernard C Lecante E Berthonnaud S Verlet

Materials and methods This is a preliminary randomized study lead at the CMCR des Massues in Lyon since April 2010 to January 2011 about 40 teenagers treated by Abbott cast. First group (n=17) have had 3D analysis before cast and second (n=23) group after cast. With the 3D analysis we have worked out if the thoracic band was put by classical method or was conversely put (based on plane of maxim...

2017
Giuseppina A. Giorgio Maria Ragosta Vito Telesca

The Urban Heat Island (UHI) phenomenon prevalently concerns industrialized countries. It consists of a significant increase in temperatures, especially in industrialized and urbanized areas, in particular, during extreme warm periods like summer. This paper explores the climate variability of temperatures in two stations located in Matera city (Southern Italy), evaluating the increase in temper...

Journal: :The Biochemical journal 1984
N Yoshimura I Tsukahara T Murachi

Two forms of Ca2+-dependent cysteine proteinase (calpain, EC 3.4.22.17) and their specific endogenous inhibitor (calpastatin) were partially purified from porcine retina: calpain I (low-Ca2+-requiring form) was half-maximally activated at 8 microM-Ca2+, and calpain II (high-Ca2+-requiring form) at 250 microM-Ca2+. Both calpain I and calpain II were inhibited by calpastatin. Calpain I from porci...

2009
Alice Hall

This survey study investigated whether viewer perceptions of reality programs’ authenticity were associated with involvement, enjoyment, and perceived learning. Four dimensions of perceived authenticity were identified: cast eccentricity, representativeness, candidness, and producer manipulation. Perceptions that the cast was not eccentric, that they were representative of people the respondent...

Journal: :Transportation Science 2000
Guy Desaulniers Daniel Villeneuve

Guy Desaulniers and Daniel Villenueve The problem considered involves finding the minimum cost path, with cost and time being two independent quantities that govern the shortest path. In this problem, each arc is associated with a cost of traversing the arc as well as the time required to traverse it and each node is associated with a lower bound and an upper bound on the time of departure from...

2016
Shaomei Wang Tingting Cui Meiqin Wang

CAST-128 and CAST-256 are two symmetric algorithms designed by Adams in 1990s. Both of them adopt the CAST design procedure which makes them process a number of desirable cryptographic. CAST-128 is notably used as the default cipher in some versions of GNU Privacy Guard (GPG) and Pretty Good Privacy (PGP) systems. As an extension of CAST-128, CAST-256 was submitted as a candidate for the Advanc...

Journal: :The Journal of biological chemistry 2002
Peter Tompa Zoltan Mucsi Gyorgy Orosz Peter Friedrich

The inhibitory domains of calpastatin contain three highly conserved regions, A, B, and C, of which A and C bind calpain in a strictly Ca(2+)-dependent manner but have no inhibitory activity whereas region B inhibits calpain on its own. We synthesized the 19-mer oligopeptides corresponding to regions A and C of human calpastatin domain I and tested their effect on human erythrocyte mu-calpain a...

1999
David A. Wagner

This paper describes a new diierential-style attack, which we call the boomerang attack. This attack has several interesting applications. First, we disprove the oft-repeated claim that eliminating all high-probability diierentials for the whole cipher is suucient to guarantee security against diierential attacks. Second, we show how to break COCONUT98, a cipher designed using decorrelation tec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید