نتایج جستجو برای: فیبرهای آوران lll
تعداد نتایج: 1708 فیلتر نتایج به سال:
This study aims to examine the relationship between lifelong learning levels and information literacy skills in teacher candidates. The research group consists of 127 physical education and sports teacher candidates. Data were collected by means of “Lifelong Learning Scale (LLL)” and "Information Literacy Scale". In the data analysis, “mean, standard deviation and Product-Moment Correlation coe...
Running Title: Low-level laser irradiation in disuse muscle atrophyAbstract Low-level laser (LLL) irradiation promotes proliferation of muscle satellite cells, angiogenesis and expression of growth factors. Satellite cells, angiogenesis and growth factors play important roles in the regeneration of muscle. The objective of this study was to examine the effect of LLL irradiation on rat gastrocne...
BACKGROUND Permanent polymer drug eluting stents (PP-DES) may induce inflammation of the vessel wall due to the existence of the polymer, which may delay intimal healing. Polymer-free DES (PF-DES) that eliminate the polymeric carrier may potentially lead to safer DES. However, the safety and efficacy of PF-DES remains controversial. METHODS Randomized controlled trials comparing PF-DES with P...
A new strategy for selective nodal dissection in non-small cell lung cancer (NSCLC) patients according to the segment of primary tumor was explored. Data on 504 patients with NSCLC of less than 5 cm, histologically revealed to be N2 disease after thoracotomy, were analyzed. In right upper lobe (RUL) tumor, when the pretracheal node was negative, the incidence of subcarinal involvement was 3.8%....
Lower limb lymphedema and neurological complications after lymphadenectomy for gynecological cancer.
OBJECTIVE Lymphadenectomy is a frequent procedure for surgical staging of gynecological malignancies. Nevertheless, minor complications, such as lower limb lymphedema (LLL) and neurological complications (NCs), after pelvic and aorto-caval lymphadenectomy still remain underinvestigated. The present study considers short-term and long-term incidence and risk factors for LLL and NC in patients wi...
A flow-through pilot-scale system was tested for removal of Cr(VI) from contaminated groundwater in Glendale, California. The process consisted of the reduction of Cr(VI) to Cr(lll) using ferrous sulfate followed by coagulation and filtration. Results indicated that the technology could reduce influent Cr(VI) concentrations of 100 microg L(-1) to below detectable levels and also remove total Cr...
Tadlock, Laura, Yoko Yamagiwa, James Hawker, Carla Marienfeld, and Tushar Patel. Transforming growth factorinhibition of proteasomal activity: a potential mechanism of growth arrest. Am J Physiol Cell Physiol 285: C277–C285, 2003. First published March 19, 2003; 10.1152/ ajpcell.00550.2002.—Although the proteasome plays a critical role in the controlled degradation of proteins involved in cell ...
Although the LLL algorithm was originally developed for lattice basis reduction, the method can also be used to reduce the condition number of a matrix. In this paper, we propose a pivoted LLL algorithm that further improves the conditioning. Our experimental results demonstrate that this pivoting scheme works well in practice.
BACKGROUND The comparative performance of different drug-eluting stents (DES) among female patients has not been assessed in a randomized manner. OBJECTIVES The SPIRIT Women Clinical Evaluation trial compared the durable polymer everolimus-eluting XIENCE stent (DP-EES) with the durable polymer sirolimus-eluting Cypher stent (DP-SES) in women undergoing percutaneous coronary intervention (PCI)...
Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL Reduction
In this paper, we give an attack against a public key cryptosystem based on Diophantine equations of degree increasing type (DEC) proposed by the third author ([Oku15]). We show that the security of DEC depends on the difficulty of finding special (relatively) short vectors in some lattices obtained from a public key and a ciphertext. The most important target vector in our attack is not necess...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید