نتایج جستجو برای: attacked khorram
تعداد نتایج: 4890 فیلتر نتایج به سال:
given a finite non-cyclic group $g$, call $sigma(g)$ the smallest number of proper subgroups of $g$ needed to cover $g$. lucchini and detomi conjectured that if a nonabelian group $g$ is such that $sigma(g) < sigma(g/n)$ for every non-trivial normal subgroup $n$ of $g$ then $g$ is textit{monolithic}, meaning that it admits a unique minimal normal subgroup. in this paper we show how thi...
Direct contact between host cells allows some bacteria to spread within the body without being attacked by the immune system.
Background and objectives: Urinary tract infection is one of the most nosocomial infections with different antibiotic resistance pattern. This study was aimed to investigate the pattern of susceptibility and resistance of uropathogenic E. coli strains that had been isolated from those who referred to the private laboratories in Khorram-Abad city. Materials and Methods: This empirical s...
Collagenases produced by human polymorphonuclear leukocytes, human lung fibroblasts, and rabbit pulmonary alveolar macrophages were compared in their ability to digest soluble native type I and type III collagens. While the fibroblast and macrophage collagenases attacked the two substrates at approximately equal rates, the leukocyte collagenase attacked type I collagen preferentially (15:1) in ...
A general hill-climbing attack to biometric systems based on a modification of the downhill simplex algorithm is presented. The scores provided by the matcher are used in this approach to adapt iteratively an initial estimate of the attacked template to the specificities of the client being attacked. The proposed attack is evaluated on a competitive feature-based signature verification system o...
CTC is a toy cipher designed by Courtois in order to prove the strength of algebraic attacks. In this paper we study the differential and the linear behavior of the 85 S-boxes version, which is attacked using algebraic techniques faster than exhaustive key search. We show that an n-round variant of the cipher can be attacked by a linear attack using only 2 known plaintexts, with a negligible ti...
The paper analyzes the move of discrediting the opponent as a means to persuasion in political debates. After analysis of a corpus of political debates, a typology of discrediting strategies is outlined, distinguished in terms of three criteria: the target – the feature of the opponent specifically attacked (dominance, competence, benevolence); the route through which it is attacked – topic, mo...
In recent years, global natural disasters have been frequent and resulted in great casualties and property loss. Since Wenchuan earthquake, the disaster emergency rescue system of China has obtained considerable development in various aspects including team construction, task scheduling, personnel training, facilities and equipments, logistics, etc. On April 25, 2015, an earthquake that measure...
The disease, however, did not spread to any extent at that period. Of its outbreak and spread in the city of Dacca a full description will be given below. At present its dissemination, throughout the district will be traccd. The first place from which the appearance of dengue was reported was Mirpur?a prosperous trading village eight miles due north of the city. On the 31st May, two schoolboys,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید