نتایج جستجو برای: tg abs

تعداد نتایج: 27344  

2002

The activities of liver, muscle, and red blood cell enzymes involved in the degradation of purine were assayed in zinc deficient (ZD), pair-fed control (PF) and ad libitum-fed control (Ad lib) rats. Diets (1.5 ppm of zinc in ZD diet and 110 ppm in control diet) were fed to rats for 6 weeks after which they were sacrificed and tissues isolated for several assays. Results indicated a significant ...

2002

Calcium elenolate is a multifunctional monoterpene which can be isolated from acid-hydrolyzed aqueous extracts of various parts of olive plants. Viruses tested in this study were: Coxackievirus A21, parainfluenza 3 virus, herpesvirus (MRS), pseudorabies virus, vesicular stomatitis virus, encephalomyocarditis virus, Newcastle virus (GB), poliovirus 1,2,and 3, influenza A virus (PR8), Sindbis vir...

2015
Crystal Chang Din Richard Bubel Reiner Hähnle

We present KeY-ABS, a tool for deductive verification of concurrent and distributed programs written in ABS. KeY-ABS allows to verify data dependent and history-based functional properties of ABS models. In this paper we give a glimpse of system workflow, tool architecture, and the usage of KeY-ABS. In addition, we briefly present the syntax, semantics and calculus of KeY-ABS Dynamic Logic (ABS...

2002
Laurel Kirkland John Mustard John McAfee Bruce Hapke Michael Ramsey

s ...................................................................................................................................19 R. Arvidson: Mars Exploration and Importance of Spectroscopic Observations [abs. 2003] J. Bishop, M. Lane, E. Murad: The Power of Combining Multiple Spectroscopic Techniques for Mineral Identification on Mars and the Necessity of Lab and Field Study of Analog M...

2016
Stijn de Gouw Jacopo Mauro Behrooz Nobakht Gianluigi Zavattaro

Traditional development methodologies that separate software design from application deployment have been replaced by approaches such as continuous delivery or DevOps, according to which deployment issues should be taken into account already at the early stages of development. This calls for the definition of new modeling and specification languages. In this paper we show how deployment can be ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده شیمی 1389

رزینهای اپوکسی یک دسته مهم از پلیمرهای گرماسخت هستند که بدلیل خواص مناسب الکتریکی، مکانیکی و مقاومت بالای شیمیایی بطور وسیعی در روکشهای محافظ سطح، کامپوزیتهای با کارآیی بالا، ریخته گری، ابزارسازی، چسب و کاربردهای الکتریکی مورد استفاده قرار می گیرند. در بحث خواص مکانیکی پائین بودن استحکام ضربه ای و مقاومت شکست و مقاومت کم در برابر گسترش پارگی بعنوان مهمترین نقص آنها تلقی می شود. هدف اصلی این کار...

2017
Yuji Ohkubo Tomonori Aoki Satoshi Seino Osamu Mori Issaku Ito Katsuyoshi Endo Kazuya Yamamura

A container used in contact lens cleaning requires a Pt plating weight of 1.5 mg for H₂O₂ decomposition although Pt is an expensive material. Techniques that decrease the amount of Pt are therefore needed. In this study, Pt nanoparticles instead of Pt plating film were supported on a substrate of acrylonitrile-butadiene-styrene copolymer (ABS). This was achieved by the reduction of Pt ions in a...

Journal: :Medical physics 1997
D S Followill D S Davis W F Hanson

Since 1984, the Radiological Physics Center (RPC) has used the American Association of Physicists in Medicine Task Group 21 (TG-21) protocol (absorbed dose determination) as the basis of its On-site Dosimetry Review visits to institutions participating in the National Cancer Institute's cooperative clinical trials. Subsequent to the TG-21 protocol, the Task Group 25 (TG-25) report on electron-b...

Journal: :Journal of Computer Security 2010
James R. Conrad Jim Alves-Foss Sauchi Stephen Lee

We introduce TG/MC, a Monte-Carlo approach for evaluating the impact of uncertainty about vulnerabilities upon forecasts of security for a real-world system modeled by a protection graph. A TG/MC model defines a vulnerability as a potential change to an otherwise safe initial protection graph that, if exploited, leads to an unauthorized state, a violation of the system’s security policy through...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید