نتایج جستجو برای: horizontal buffer

تعداد نتایج: 104649  

Journal: :the iranian journal of pharmaceutical research 0
mohammad karami department of toxicopharmacology, school of pharmacy, mazandaran university of medical sciences, sari, iran. sodabah saeidnia medical plants research center, tehran university of medical sciences, tehran, iran. anahita nosrati pathology department, school of medicine, mazandaran university of medical sciences, sari, iran.

liver injury induced by viruses, chemicals and drugs can be protected by different medicinal plants. feijoa sellowiana (myrtaceae) is an evergreen bush native to southern areas of south america, as well as iran where the fruits are very popular. feijoa has shown a potent antimicrobial effect. morever, the antioxidant activity of total feijoa extract has also been reported. mdma or ecstasy is a ...

2014
Richard Robinson

By the time visual information leaves the retina for the brain, it has undergone several rounds of processing. Most prominently, that information has been filtered to amplify differences in contrast, between either two points in space or two points in time. The initial step in that amplification is carried out by horizontal cells, whose job is not only to receive signals from a group of adjacen...

2001
Donald R. Deese

DB2 data sharing offers many advantages in the right environment, and performs very well when DB2 is properly tuned. DB2 data sharing can significantly increase capacity, it offers increased availability, and it provides a flexible operating environment. In certain environments, DB2 data sharing can dramatically improve performance of DB2 subsystems (e.g., when most data are shared and most of ...

2004
Roberto Beraldi Antonio Iera Salvatore Marano

In order to deal with buffer overflow in ATM-based high-

2005
Fumiaki NAGANO Kohei TATARA Toshihiro TABATA Kouichi SAKURAI

Numerous security technologies which detect buffer overflow have already proposed. Almost these technologies detect if buffer overflows happen or not, but don’t detect alteration of variable integrity. But there are attacks which are not be able to be defenced unless the technology detect alteration of variable integrity. So in this paper, we propose a system which detect alteration of variable...

1997
Aviezri S. Fraenkel Jamie Simpson Mike Paterson

A weak square in a binary word is a pair of adjacent non-empty blocks of the same length, having the same number of 1s. A weak circular square is a weak square which is possibly wrapped around the word: the tail protruding from the right end of the word reappears at the left end. Two weak circular squares are equivalent if they have the same length and contain the same number of ones. We prove ...

1998
Wladek Olesinski Pawel Gburzynski

We investigate experimentally several routing algorithms for asynchronous deflection networks, i.e., ones that operate in an unslotted manner. We determine the impact of an extra input buffer space on the quality of routing decisions. Finally, we compare the performance of asynchronous and synchronous deflection networks.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید