نتایج جستجو برای: expire

تعداد نتایج: 549  

Journal: :CoRR 2013
Ahmad Alamgir Khan

Phishing is a type of attack in which cyber criminals tricks the victims to steal their personal and financial data. It has become an organized criminal activity. Spoofed emails claiming to be from legitimate source are crafted in a way to lead victims to reveal their personal, financial data by misdirecting them to the counterfeit website. This research paper presents a novel approach to comba...

Journal: :The Journal of biological chemistry 1967
J D Erfle F Sauer

Fasting ketosis caused no change in liver acetylcarnitine concentration but caused a decrease in muscle acetylcarnitine to one-half the control level. The combined acetyl coenzyme A and acetylcarnitine turnover rates for control and ketotic liver were, respectively, 4.66 and 10.90 mpmoles per g (fresh weight) per min; for normal and ketotic muscle the corresponding figures were 8.23 and 4.52 mp...

2013
P. Sarkar H. Gredler S. Hegde S. Litkowski B. Decraene R. Rodriguez H. Raghuveer

This document describes an extension to IS-IS protocol [ISO10589], [RFC1195] to add an optional operational capability, that allows tagging and grouping ofthe nodes in an IS-IS domain. This allows simple management and easy control over route and path selection, based on local configured policies. This document describes the protocol extensions to disseminate pernode administrative tags in IS-I...

Journal: :Stroke 1992
H J Chen T C Lee C P Wei

BACKGROUND AND PURPOSE We present an anecdotal series of 11 patients without past history of stroke with progressive neurological deterioration while on medical therapy for large cerebellar infarctions. Clinical signs of brain stem compression developed in these patients. Computerized tomography of the head confirmed mass effect from brain edema. It was the clinical judgment of the neurologists...

2014
Parul Singh

Link Expiration is a major problem in existing secure as well as non-secure routing protocols of mobile ad hoc network (MANET) and is one of the most encouraging research areas. Due to link expiration packet loss and other routing overhead increased. So, the requirement is both: secure and reliable link. Secure communication in mobile ad hoc networks is difficult due to the following factors: m...

Journal: :Development 2006
Takashi Moriguchi Nakano Takako Michito Hamada Atsuko Maeda Yuki Fujioka Takashi Kuroha Reuben E Huber Susan L Hasegawa Arvind Rao Masayuki Yamamoto Satoru Takahashi Kim-Chew Lim James Douglas Engel

Gata3 mutant mice expire of noradrenergic deficiency by embryonic day (E) 11 and can be rescued pharmacologically or, as shown here, by restoring Gata3 function specifically in sympathoadrenal (SA) lineages using the human DBH promoter to direct Gata3 transgenic expression. In Gata3-null embryos, there was significant impairment of SA differentiation and increased apoptosis in adrenal chromaffi...

2010
Stephen Melvin

Approaches to data protection have traditionally focused on physical security and/or cryptographic security, but the automatic deletion of data as a form of protection has not been widely employed. However, a vast amount of data is stored that has only a limited useful life and presents a risk to privacy and security after that time period. Approaches to data deletion can be broadly classified ...

2005
Robert M. White Steven H.Y. Wong

T he Clreat Paracelsus (Philipus Aureolus Theophrastus Bonihastus von Hohenheini-Paracelsus, 1493-1541) is remembered by toxicologists for his famous quote: "All substances are poisons; there is none which is not a poison. Tlie right dose differtntiates a poison from a remedy-"' Intieed, tiic l)iisic principle from the quotation still applies today. The right dose of morphine that will produce ...

Journal: :RFC 2005
Pasi Sarolahti Markku Kojo

Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working ...

2012
Byung-Hyun Joe Uk Jo Hyun-Soo Kim Chang-Bum Park Hui-Jeong Hwang Il-Suk Sohn Eun-Sun Jin Jin-Man Cho Jeong-Hwan Park Chong-Jin Kim

While the disease course of stress-induced cardiomyopathy (SIC) is usually benign, it can be fatal. The prognostic factors to predict poorer outcome are not well established, however. We analyzed the Acute Physiology And Chronic Health Evaluation (APACHE) II score to assess its value for predicting poor prognosis in patients with SIC. Thirty-seven consecutive patients with SIC were followed pro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید