نتایج جستجو برای: pico

تعداد نتایج: 2817  

2010
R. Sharma A. Sharma

In nature, metal oxide particles display their existance of picomolecules in solution state at the picoscale and bioactive states in the body. We put evidence of picomolar behavior of picoscale molecules different than nanomolar behavior of particles using PICOTECHNOLOGY devices. PICOTECHNOLOGY means picomolar measurement of picoscale molecule physical properties measured by pico-devices or pic...

2014
Yong Seok Hwang Valery I. Levitas

Articles you may be interested in Phase field simulation of kinetic superheating and melting of aluminum nanolayer irradiated by pico-and femtosecond laser Appl. Highly localized heat generation by femtosecond laser induced plasmon excitation in Ag nanowires Appl. Origin of temperature plateaus in laser-heated diamond anvil cell experiments Ultrafast melting and resolidification of gold particl...

2011
Frank Stajano

From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for implementers, for users they are increasingly unmanageable. The demands placed on users (passwords that are unguessable, all different, regularly changed and never written down) are no longer reasonable now that each person has to manage dozens of passwords. Yet we can’t...

2006
John Hesketh Iwona Wybranska Yvonne Dommels Maria King Ruan Elliott Catalina Pico Jaap Keijer

John Hesketh*, Iwona Wybranska, Yvonne Dommels, Maria King, Ruan Elliott, Catalina Pico and Jaap Keijer Institute of Cell and Molecular Biosciences, University of Newcastle, Newcastle upon Tyne, UK Collegium Medicum, Jagiellonian University, Krakow, Poland RIKILT – Institute of Food Safety, Wageningen, The Netherlands Institute of Food Research, Norwich, UK University of the Balearic Islands, P...

Journal: :Lab on a chip 2012
Erica Ueda Florian L Geyer Victoria Nedashkivska Pavel A Levkin

We describe a one-step method for creating thousands of isolated pico- to microliter-sized droplets with defined geometry and volume. Arrays of droplets are instantly formed as liquid moves along a superhydrophilic-superhydrophobic patterned surface. Bioactive molecules, nonadherent cells, or microorganisms can be trapped in the fully isolated microdroplets for high-throughput screening, or in ...

2017
John Rathbone Loai Albarqouni Mina Bakhit Elaine Beller Oyungerel Byambasuren Tammy Hoffmann Anna Mae Scott Paul Glasziou

BACKGROUND Citation screening for scoping searches and rapid review is time-consuming and inefficient, often requiring days or sometimes months to complete. We examined the reliability of PICo-based title-only screening using keyword searches based on the PICo elements-Participants, Interventions, and Comparators, but not the Outcomes. METHODS A convenience sample of 10 datasets, derived from...

  Background : Glenoid bone damages consisting of anterior rim erosion and bony avulsion are very important in decision making for treatment of recurrent dislocation in shoulder joint. This study was aimed to determine the prevalence of these damages in patients with anterior recurrent shoulder dislocation.   Methods : The study was a cross-sectional study evaluating patients with unstable shou...

2016
Jakob Belschner Daniel de Abreu Joachim Habermann Veselin Rakocevic

Pico base stations are an important instrument to increase the capacity of mobile radio networks. Due to the limited spectrum availability it will be necessary to operate macro and pico base stations on the same frequency bands. In this case the transmit power imbalance between different base station types creates new interference situations. Coordinated beamforming is one method of base statio...

2016
David Llewellyn-Jones Graeme Jenkinson Frank Stajano

Password sharing is widely used as a means of delegating access, but it is open to abuse and relies heavily on trust in the person being delegated to. We present a protocol for delegating access to websites as a natural extension to the Pico protocol. Through this we explore the potential characteristics of delegation mechanisms and how they interact. We conclude that security for the delegator...

2009
Jonathan Kirsch Brian Coan

This paper presents PICO, a distributed protocol that manages group membership and keying in mobile adhoc networks (MANETs). PICO tolerates a limited number of Byzantine nodes and an additional limited number of crashed nodes. It allows clients to join or leave a dynamically changing group and provides group members with a dynamically updated group encryption key. Since MANETs are characterized...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید