نتایج جستجو برای: quot

تعداد نتایج: 4802  

2012
Amandeep Kaur Harsh Kumar Verma Ravindra Kumar Singh William Stallings Behrouz A. Forouzan Johannes A. Buchmann Dhiren R. Patel Tim Spiller

layfair cipher is the well-known multiple letter encryption cipher. Here the digraphs in the plaintext are treated as single units and converted into corresponding cipher text digraphs. However because of the drawbacks inherent in the 5 X 5 Playfair cipher which adversely affects the security we proposed a 6 X 6 Playfair cipher and then coupled it with Linear Feedback Shift Register based Uniqu...

Journal: :acta medica iranica 0
m. rasoolinejad a. haddadian m. haji abdolbaghi

the clinical and histological feature of 52 years old woman with erythema induratum are discribed the characteristic cutaneous lesions on the legs of middle-aged woman were violaceous, indurated nodules, 1 to 2 cm in diameter which were painful, occasionally ulcerated and could heal with scarring. the diagnosis was confirmed by a strongly positive tuberculin test, histologic feature and by clea...

Journal: :acta medica iranica 0
m. amini b. moaydi m. ani" s. yonesi m. hosseinpour1

in an attempt to determine the clinical value of frnctosamine assay for monitoring type ii diabetic patients, correlation of frnctosamine with glycosylated hemoglobin was studied. 100 patients with type ii diabetes mcllitus were compared with 100 normal subjects. fasting blood glucose, glycosylated hemoglobin, albumin and frnctosamine were measured in alt subjects. in the diabetic patients, a s...

2015
E. Padmalatha C. R. K. Reddy Padmaja Rani

Mining is involved with knowing the unknown characteristics from the databases or gaining of Knowledge (Knowledge Discovery) from Databases to get more useful information from the database. Real time databases which are constantly changing with time, there may arise a point when traditional Data Mining techniques may not be adequate as there may be a previously unknown class label involved or n...

2015
Ekta Gupta Rajendra Singh Kushwah J. Yu D. Liu D. Tao H. Seah X. Tian X. Hua X. Wu

With the ever expanding database and advancement of technology in the fields of Data mining, remote sensing and management of Earth resources, Crime prevention, Weather Forecasting, E-commerce, Medical Imaging, and soon. The Content Based Image Retrieval Technique is becoming more and more indispensable and vital. The paper proposes Content Based Image Retrieval technique incorporating WBCHIR (...

2017

Patients with breast cancer that has metastasised to the meninges may now be treated with DepoCyt, a slow-release formulation of the cytotoxic drug, cytarabine. This treatment has been reported in studies published in October 2000( [1] ) and January 2001( [2] ). Both report encouraging therapeutic benefit in combating neoplastic meningitis in breast cancer, but cite arachnoiditis as one of the ...

2013
Priyanka N. Kamble Parikshit N. Mahalle Leanid Krautsevich Fabio Martinelli Charles Morisset Artsiom Yautsiukhin Yanchun Zhang Jinli Cao

Access control is a fundamental and essential mechanism to maintain security in ubiquitous computing (UbiComp). Flexibility is an important property for general access control system, which can be achieved by access or authority delegation. Existing delegation mechanisms are "subject-centered", thus in order to make sure that the unavailability of some users does not prevent the syste...

Journal: :Geographica Helvetica 1966

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید