نتایج جستجو برای: bypassing

تعداد نتایج: 3464  

2015
Hee Young Ju Hye Lim Jang Young Shil Park

BACKGROUND Inhibitory antibodies to factor VIII (FVIII) or IX (FIX) are important issues when managing patients with hemophilia A or B. Advances in bypassing agents such as recombinant activated FVII (rFVIIa) and activated prothrombin complex concentrates (APCC) have enabled the aggressive management of hemophilia with inhibitors during emergency or elective surgery. This study provides an upda...

2013
Nicholas C. Kraus

A mathematical model is presented for calculating the change in volume and sand-bypassing rate at ebb-tidal shoals. Conceptually and mathematically, the ebb-tidal shoal is distinguished from bypassing bars that emerge from it and from attachment bars where the bypassing bars merge with the beach. The volumes and bypassing rates of these morphologic entities are calculated by analogy to a reserv...

2014
Kesanakurthi Rajasekhar J. Kiran Chandrasekhar

Article history: Received Accepted Available online 20 Nov. 2014 19 Dec. 2014 25 Dec. 2014 Based on the simplification of the addition operations in a low-power bypassing-based multiplier, a low-cost low-power bypassing-based multiplier is proposed. Row-bypassing multiplier, column-bypassing multiplier, 2-Dimensional bypassing multiplier and braun multipliers are implemented in CMOS and GDI tec...

Journal: :Nature communications 2014
Ekaterina Samatova Andrey L Konevega Norma M Wills John F Atkins Marina V Rodnina

The gene product 60 (gp60) of bacteriophage T4 is synthesized as a single polypeptide chain from a discontinuous reading frame as a result of bypassing of a non-coding mRNA region of 50 nucleotides by the ribosome. To identify the minimum set of signals required for bypassing, we recapitulated efficient translational bypassing in an in vitro reconstituted translation system from Escherichia col...

2006
Colin Wong

The XML port scanning technique described in this paper allows an attacker to utilise an XML parser to execute port scanning of systems behind a restrictive perimeter firewall. While the technique relies on some reasonably specific implementation details in order to be exploitable remotely, it is potentially applicable to any application that accepts XML document inputs. Several workarounds exi...

Journal: :Philosophical Studies 2022

Abstract A common style of argument in the literature on free will and moral responsibility is Manipulation Argument. These tend to begin with a case an agent deterministic universe who manipulated, say, via brain surgery, into performing some action. Intuitively, this not responsible for that Yet, since there no relevant difference, respect whether responsible, between manipulated typical univ...

Journal: :Journal of Physics: Conference Series 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید