نتایج جستجو برای: intensity running forced could prevent memory corruption
تعداد نتایج: 1469556 فیلتر نتایج به سال:
Materials and methods Ninety-day-old female Wistar rats were divided into three groups: exercised-control (EC; n=5), high intensity exercised-diabetic (HIED=high intensity training, 80% of the maximum speed in the stress test; n=4) and low intensity exercised-diabetic (LIED=low Intensity training, 40% of the maximum speed in the stress test; n=6). The diabetes was induced in the rats by adminis...
BACKGROUND Although osteoarthritis (OA) is a multifactorial disease, little has been reported regarding the cooperative interaction among these factors on cartilage metabolism. Here we examined the synergistic effect of ovariectomy (OVX) and excessive mechanical stress (forced running) on articular cartilage homeostasis in a mouse model resembling a human postmenopausal condition. METHODS Mic...
Capture the Flag (CTF) is a popular computer security exercise in which teams competitively attack and/or defend programs in real time. CTFs are currently expensive to build and run; each is a bespoke affair, with challenges and vulnerabilities crafted by experts. This not only limits the educational value for players but also restricts what researchers can learn about human activities during t...
JavaScript exploits impose a severe threat to computer security. Once a zero-day exploit is captured, it is critical to quickly pinpoint the JavaScript statements that uniquely characterize the exploit and the payload location in the exploit. However, the current diagnosis techniques are inadequate because they approach the problem either from a JavaScript perspective and fail to account for “i...
Wormhole routing is most commonly used in parallel architectures in which messages are sent in small fragments, called flits. It is a lightweight and efficient method of routing messages between parallel processors. Self-stabilization is a technique that guarantees tolerance to transient faults (e.g., memory corruption or communication hazards) for a given protocol. Self-stabilization guarantee...
Memory corruption vulnerabilities are an everpresent risk in software, which attackers can exploit to obtain unauthorized access to confidential information. As products with access to sensitive data are becoming more prevalent, the number of potentially exploitable systems is also increasing, resulting in a greater need for automated software vetting tools. DARPA recently funded a competition,...
abstract birbery and corruption and other criminal and as such is one of social phenomena , and i can firmly say that society is protected and safe from harm , this is criminal . eache community is familiar with these crimes and the crime associated ( direct or indirect ) with the political economic , social , and cultural beliefs and religious issues , especially with the community . admitted...
In two previous studies, it was observed that schizophrenic patients display increased confidence in memory errors compared with controls. The patient group displayed an increased proportion of errors in their knowledge system, quantified as the percentage of high-confident responses that are errors. The latter phenomenon has been termed knowledge corruption and is put forward as a risk factor ...
This paper addresses the impact of vertical elasticity for applications with dynamic memory requirements when running on a virtualized environment. Vertical elasticity is the ability to scale up and scale down the capabilities of a Virtual Machine (VM). In particular, we focus on dynamic memory management to automatically fit at runtime the underlying computing infrastructure to the application...
Corruption has been widespread, it is increasingly systematic, inducing losses to the national economy. Article 2 paragraph (2) of Law Number 31 1999 concerning Eradication Criminal Acts Corruption, death penalty can be imposed under certain conditions, but so far there no corruptor sentenced death. This study discussed issues related with corruption, including: first, how urgency applied corru...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید