نتایج جستجو برای: c45 algorithm

تعداد نتایج: 754261  

Journal: :Communications materials 2022

Abstract Intermetallic alloys such as FeTi have attracted ever-growing attention a safe and efficient hydrogen storage medium. However, the utilization of high-purity metals for synthesis materials poses considerable concerns over environmental sustainability their large-scale production. Here, we report an approach synthesizing from industrial scraps iron (steels C45 316 L) titanium (Ti alloy ...

Journal: :Production Engineering Archives 2021

Abstract Tool wear and surface roughness as performance indexes are considered to be the most important in terms of hardened materials’ machinability. The best combination cutting parameters which enhances compromise between tool life, productivity machined quality contribute benefice on production cost, makes manufacturing industry interested it. aim this research is investigate life ceramic m...

Journal: :Energies 2023

In this paper, we analysed the influence of corrosion processes and addition a carbon black-heteropoly phosphomolybdic acid (C45-MPA) nanocomposite on operating parameters hydride electrode obtained basis intermetallic compound La2Ni9Co. The electrochemical properties negative electrodes for NiMH batteries were studied using galvanostatic charge/discharge curves, potentiostatic method, impedanc...

2009
Subrahmanya Shreepathi Hung Van Hoang Rudolf Holze

Corrosion protection performance of a completely soluble polyaniline-dodecylbenzenesulfonic acid salt (PANI-DBSA) on C45 steel has been studied with electrochemical impedance and potentiodynamic measurements. Chloroform is the most suitable solvent to process the pristine PANI-DBSA because of negligible interaction of the solvent with the polyaniline (PANI) backbone. An anodic shift in the corr...

Journal: :Journal of virology 2000
S E Delos J M White

The transmembrane subunit (TM) of the envelope glycoprotein (Env) of the oncovirus avian sarcoma/leukosis virus (ASLV) contains an internal fusion peptide flanked by two cysteines (C9 and C45). These cysteines, as well as an analogous pair in the Ebola virus GP glycoprotein, are predicted to be joined by a disulfide bond. To examine the importance of these cysteines, we mutated C9 and C45 in th...

Journal: :Cancer research 1988
M J Ratain A E Staubus R L Schilsky L Malspeis

The limited sampling model (LSM) offers a means of estimating the area under the concentration-time curve (AUC) from only two timed plasma concentrations. In this study, pharmacokinetic profiles were simulated for 23 patients treated with amonafide, using each patient's individual pharmacokinetic parameters. Data were simulated for a dose of 250 mg/m2 administered over 1 h. The initial 15 patie...

2013
Young-Woo PARK Man-Bok JEONG Eui Ri LEE Yesran LEE Jae-Sang AHN Soo-Hyun KIM Kangmoon SEO

Central corneal thickness (CCT) can be a promising source of glaucoma monitoring and diagnosis. This study evaluated changes in CCT according to experimental adjustment of intraocular pressure (IOP) in canine eyes. To adjust and measure IOP, each eye was cannulated with two 26-gauge needles under inhalant anesthesia. One needle was connected to a pressure transducer, and the other was connected...

Journal: :Arquivos brasileiros de cardiologia 2007
Bernardo Assumpção de Mônaco Anderson Benício Ivan Salvador Bonillo Contreras Larissa Eckmann Mingrone Gerson Ballester Luiz Felipe Pinho Moreira

OBJECTIVES To evaluate the effectiveness of acute ischemic preconditioning (IP), based on somatosensory evoked potentials (SSEP) monitoring, as a method of spinal cord protection and to asses SSEP importance in spinal cord neuromonitoring. METHODS Twenty-eight dogs were submitted to spinal cord ischemic injury attained by descending thoracic aorta cross-clamping. In the C45 group, the aortic ...

2012
Sushil Kumar Chaturvedi Vineet Richariya

In this paper, Intrusion detection is to detect attacks(Intrusions) against a computer system. In the highly networked modern world, conventional techniques of network security such as cryptography, user authentication and intrusion prevention techniques like firewalls are not sufficient to detect new attacks. In this paper, we perform experiments on the kddcup99 data set. We perform dimensiona...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید