نتایج جستجو برای: tlm method

تعداد نتایج: 1630574  

Journal: :The Laryngoscope 2017
Marco Lucioni Andy Bertolin Marco Lionello Luciano Giacomelli Guido Ghirardo Giuseppe Rizzotto Gino Marioni

OBJECTIVES/HYPOTHESIS To retrospectively analyze our experience of transoral laser microsurgery (TLM) for treating postoperative laryngeal obstruction (POLO) after supracricoid and supratracheal laryngectomy (open partial horizontal laryngectomy [OPHL]) types 2 and 3, and to investigate potential relationships between patients' clinical features and their functional outcomes. STUDY DESIGN A r...

Journal: :ORL; journal for oto-rhino-laryngology and its related specialties 2014
Claudio Vicini Carlo Antonio Leone Filippo Montevecchi Elisa Dinelli Veronica Seccia Iacopo Dallan

AIMS To assess the role of transoral robotic surgery (TORS) in managing failures of conventional transoral laser microsurgery (TLM) in cases with difficult laryngeal exposure. METHODS Retrospective analysis of 3 patients with difficult laryngeal exposure treated with TORS. All 3 cases failed to be managed by conventional TLM after repeated attempts by experienced surgeons. In 2 cases, the ini...

Journal: :Semiconductor Science and Technology 2023

Abstract Lateral depletion-mode, beta-phase gallium oxide ( β -Ga 2 O 3 ) metal-oxide-semiconductor field-effect transistors (MOSFETs) with source-drain spacings of µ m, 8 and 13 m are studied using a modified transfer length method (TLM) to obtain sheet resistances in the gated ungated regions as well observe their gate electric field dependence. The TLM requires contact resistance be independ...

2008
Katalin Popovici Ahmed Jerraya

Interconnect Component MEM T2 HDS API Transaction Accurate Architecture T2 T3 Comm OS HAL API HDS API SystemC TLM Interconnect Component (Bus/NoC) CPU-SS1 Abstract CPU1 Periph Interface Memory Abstract CPU2 Periph Interface Memory CPU-SS2 MEM-SS T2 HDS API Comm OS HAL API T3 HAL Virtual Prototype SystemC TLM CPU-SS1 CPU1 ISS Periph Interface Memory CPU2 ISS Periph Interface Memory CPU-SS2 Inter...

Journal: :Head & neck 2016
Migie Lee Malcolm A Buchanan Faruque Riffat Carsten E Palme

BACKGROUND Transoral laser microsurgery (TLM) of the glottis is increasingly utilized in the current management of early glottic cancer, its advantages being administrative ease, potential to be repeated, ability to keep radiotherapy and open laryngeal surgery available as salvage options, and low complication rates. METHODS A retrospective chart review of prospectively gathered data on all p...

Journal: :Polish journal of veterinary sciences 2011
J Kinasiewicz M Sabat M Antosiak-Iwańska E Godlewska E Sitarek T Orłowski

Transplantation of the pig islets of Langerhans is considered as the future treatment for patients suffering from type I diabetes mellitus. Despite the adaptation of modified Ricordi method and highly purified collagenase, the results of pancreas digestions are precarious. Selection of proper donor and optimal digestion procedure are fundamental. The aim of this study was to assess the impact o...

2012
Meriam KALLEL Younes LAHBIB Adel BAGANNE Rached TOURKI

With the increasing complexity of today’s system-on-chip (SoC) designs, taking advantage of transaction level modeling (TLM) is being more widespread. TLM allows better simulation performances and early system prototyping. Therefore, the quality of a transaction level model needs to be assured. In this paper, we present a fully automated runtime verification framework for the assertion-based ve...

2015
Ryoichi Ohta Kazuma Mawatari Kentaro Shirai Hisashi Shimizu Takehiko Kitamori

We proposed "single-molecule immunoassay", quantification of single protein molecules, by developing a nanofluidics-based enzyme-linked immunosorbent assay (ELISA) device. Extremely small volume(pL-aL) and high surface-to-volume ratio of nanochannels enables ~100% capture of analyte molecules. Enzymatic amplification reaction and differential interference contrast thermal lens microscope (DIC-T...

2000
Sigrid Gürgens René Peralta

We present a method for validating cryptographic protocols. The method can find flaws which are inherent i~l the design of the protocol as well as flaws arising from the particular implementation of the protocol. The latter possibility arises from the fact that there is no universally accepted standard for describing either the cryptographic protocols themselves or their implementation. Thus, s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید