نتایج جستجو برای: piggyback line

تعداد نتایج: 411984  

Journal: :The Journal of Thoracic and Cardiovascular Surgery 2015

Journal: : 2022

The roadmap for constructing a regional nanosatellite constellation using the piggyback launch according to Chinese provider information has developed. For formation specific purpose, it is necessary analyse existing operated similar tasks. Therefore, software module Spire Global orbital construction analysis was of nanosatellites based on parameters database in two-line element set format, sat...

Journal: :IEICE Transactions 2013
Toshiro Nunome Shuji Tasaka

SUMMARY This paper deals with two types of capacity allocation schemes, i.e., static and adaptive, for uplink and downlink burst durations in the IEEE 802.16 BE (Best Effort) service. We study QoE (Quality of Experience) enhancement of audio-video IP transmission over the uplink channel with the two capacity allocation schemes. We introduce a pig-gyback request mechanism for uplink bandwidth re...

Journal: :CoRR 2018
Siddhartha Kumar Alexandre Graell i Amat Iryna Andriyanova Fredrik Brannstrom Eirik Rosnes

We present the construction of a family of erasure correcting codes for distributed storage systems that achieve low repair bandwidth and low repair complexity. The construction is based on two classes of codes, where the primary goal of the first class of codes is to achieve a good fault tolerance, while the second class of codes aims at reducing the repair bandwidth and the repair complexity....

Journal: :Journal of cataract and refractive surgery 2011
Samuel Masket Nicole R Fram

PURPOSE To evaluate the benefit of various surgical methods to address pseudophakic negative dysphotopsia. SETTING Private practice, Los Angeles, California, USA. DESIGN Interventional case series. METHODS The following 4 surgical methods were used to treat negative dysphotopsia: secondary piggyback intraocular lens (IOL) implantation, reverse optic capture, in-the-bag IOL exchange, and i...

2008
Matthew Hicks

This paper describes two hardware attacks implemented and tested on the Alpha secure communications platform. One of the attacks, Kill Switch, is a denial-of-service attack that prevents Alpha from functioning correctly after being triggered by a predetermined input sequence. Like a switch, an attacker can turn Kill Switch on and off at will, making detection more difficult and masking the sour...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان - پژوهشکده ریاضیات 1392

this is xetex, version 3.1415926-2.2-0.9995.1 (miktex 2.8) (preloaded format=xelatex 2012.4.3) 11 nov 2012 22:12 entering extended mode **template_2.tex ("c:userszahradesktopxepersian file - copy emplate_2.tex" latex2e <2009/09/24> babel and hyphenation patterns for english, dumylang, nohyphenation, ge rman, ngerman, german-x-2009-06-19, ngerman-x-2009-06-19, french, loaded. ("c:...

2014
Erdem Kinaci Cuneyt Kayaalp Sezai Yilmaz Emrah Otan

Hepatic venous outflow obstruction following liver transplantation is rare but disastrous. Here we described a 14-year-old boy who underwent a split right lobe liver transplantation with modified (side-to-side) piggyback technique which resulted in hepatic venous outflow obstruction. When the liver graft was lifted up, the outflow drainage returned to normal but when it was placed back into the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید