نتایج جستجو برای: penetration layer

تعداد نتایج: 315927  

2007
Jan K. Krasnodebski Ian A. Waitz

The applicability of a three-dimensional, steady, compressible, unstructured-mesh, viscous, Navier-Stokes solver and a two-dimensional, unsteady, slender-body approximation was studied for the investigation of lobed mixer flow fields. The viscous flow solver was evaluated for its ability to calculate the shed streamwise circulation, its subsequent downstream evolution and the thrust. The effect...

1997
Haixin Xu Kurt Mendgen

Basidiospore germlings of the cowpea rust fungus (Uromyces vignae) penetrate the epidermal cell wall of the nonhost plant Vicia faba. In order to characterize the wall structure of the penetration site, leaves were high pressure frozen, freeze substituted, and embedded in appropriate resins. With antibodies against epitopes present in pectin, polygalacturonic acid, xyloglucan, and callose, we s...

1999
BRIAN R. DULING

Vink, Hans, and Brian R. Duling. Capillary endothelial surface layer selectively reduces plasma solute distribution volume. Am. J. Physiol. Heart Circ. Physiol. 278: H285– H289, 2000.—We previously reported that a 0.4to 0.5-μmthick endothelial surface layer confines Dextran 70 (70 kDa) to the central core of hamster cremaster muscle capillaries. In the present study we used a variety of plasma ...

Journal: :The Journal of Cell Biology 1962
L. J. Rode C. Willard Lewis J. W. Foster

Resting spores of Bacillus megaterium appear uniformly opaque and undifferentiated under the electron microscope. Germinated spores and spores which have lost their dipicolinic acid underwent characteristic changes in structure. Spores fixed with KMnO(4) lose their dipicolinic acid. Spores fixed with OsO(4) under certain conditions retain their dipicolinic acid. When conventional sectioning pro...

2015
Arya Sedigh Kapilan Radhakrishnan Dhananjay Singh

This paper security measures are implemented in enterprise network architecture and evaluated against current trend of network security as well as used various methods of penetration to confirm the vulnerabilities of the network within the confines of network security management. This was achieved by using a security distribution of Linux. The main focus of this paper is on Enumeration and Scan...

2009
Mohammad Asnaashari Reza Fekrazad Fatemeh Dehghan Menshadi Massoud Seifi

INTRODUCTION Controversial results have been reported when organic acids, ultrasonic instruments and laser techniques were used to remove smear layer in endodontic treatments. The aim of this study was to evaluate the effect of removing debris and smear layer by Er,Cr:YSGG laser irradiation on the apical leakage of retrograde cavities. MATERIALS AND METHODS In this ex vivo study, 24 extracted...

Journal: :CoRR 2013
Carlos Sarraute

In this work we present a family of neural networks, the multi-layer perceptron networks, and some of the algorithms used to train those networks (we hope that with enough details and precision as to satisfy a mathematical public). Then we study how to use those networks to solve a problem that arises from the field of information security: the remote identification of Operating Systems (part o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید