نتایج جستجو برای: attacked khorram

تعداد نتایج: 4890  

Journal: :international journal of group theory 2013
martino garonzi

‎given a finite non-cyclic group $g$‎, ‎call $sigma(g)$ the smallest number of proper subgroups of $g$ needed to cover $g$‎. ‎lucchini and detomi conjectured that if a nonabelian group $g$ is such that $sigma(g) < sigma(g/n)$ for every non-trivial normal subgroup $n$ of $g$ then $g$ is textit{monolithic}‎, ‎meaning that it admits a unique minimal normal subgroup‎. ‎in this paper we show how thi...

Journal: :European heart journal 2014
Adrian Attinger-Toller Thomas F Lüscher Ulf Landmesser Fabian Nietlispach

Direct contact between host cells allows some bacteria to spread within the body without being attacked by the immune system.

شاکرمی, خاتون, شاکرمی, زینب, شمس, نعمت, نایب آقایی, محمد,

Background and objectives: Urinary tract infection is one of the most nosocomial infections with different antibiotic resistance pattern. This study was aimed to investigate the pattern of susceptibility and resistance of uropathogenic E. coli strains that had been isolated from those who referred to the private laboratories in Khorram-Abad city. Materials and Methods: This empirical s...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 1977
A L Horwitz A J Hance R G Crystal

Collagenases produced by human polymorphonuclear leukocytes, human lung fibroblasts, and rabbit pulmonary alveolar macrophages were compared in their ability to digest soluble native type I and type III collagens. While the fibroblast and macrophage collagenases attacked the two substrates at approximately equal rates, the leukocyte collagenase attacked type I collagen preferentially (15:1) in ...

2011
Marta Gomez-Barrero Javier Galbally Julian Fiérrez Javier Ortega-Garcia

A general hill-climbing attack to biometric systems based on a modification of the downhill simplex algorithm is presented. The scores provided by the matcher are used in this approach to adapt iteratively an initial estimate of the attacked template to the specificities of the client being attacked. The proposed attack is evaluated on a competitive feature-based signature verification system o...

Journal: :IACR Cryptology ePrint Archive 2006
Orr Dunkelman Nathan Keller

CTC is a toy cipher designed by Courtois in order to prove the strength of algebraic attacks. In this paper we study the differential and the linear behavior of the 85 S-boxes version, which is attacked using algebraic techniques faster than exhaustive key search. We show that an n-round variant of the cipher can be attacked by a linear attack using only 2 known plaintexts, with a negligible ti...

2011
Isabella Poggi Francesca D’Errico Laura Vincze

The paper analyzes the move of discrediting the opponent as a means to persuasion in political debates. After analysis of a corpus of political debates, a typology of discrediting strategies is outlined, distinguished in terms of three criteria: the target – the feature of the opponent specifically attacked (dominance, competence, benevolence); the route through which it is attacked – topic, mo...

2017
Xi Lin Ke-Jia Liu Yong-Gui Zhang Yang Dan Dian-Guo Xing Li Chen Ding-Yuan Du

In recent years, global natural disasters have been frequent and resulted in great casualties and property loss. Since Wenchuan earthquake, the disaster emergency rescue system of China has obtained considerable development in various aspects including team construction, task scheduling, personnel training, facilities and equipments, logistics, etc. On April 25, 2015, an earthquake that measure...

2016
James Wise

The disease, however, did not spread to any extent at that period. Of its outbreak and spread in the city of Dacca a full description will be given below. At present its dissemination, throughout the district will be traccd. The first place from which the appearance of dengue was reported was Mirpur?a prosperous trading village eight miles due north of the city. On the 31st May, two schoolboys,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید