نتایج جستجو برای: hardware
تعداد نتایج: 109085 فیلتر نتایج به سال:
Orthopedic implant removal is a commonly performed procedure. While implant removal can be associated withimproved symptoms, risks of the surgery are notable. Stripped screws, broken and retained hardware, and morbidityassociated with soft tissue compromise during difficult removal are all common. Familiarity with the instruments iscritical to procedure success. The purpose of...
this paper presents the hardware simulation (based on vhdl code) of a multiple-fault tolerant cellular genetic algorithm. this study aims to increase the immunity of cellular genetic algorithm in multiple-fault situation. here, multiple-fault refers to the situation that seu (single event upset) occurs simultaneously at two or more bits of the chromosome and fitness registers. the fault model i...
among the power drills ( electrical/ pneumatic/battery ) used in orthopedic surgery, battery drill has got several advantages. surgeons in low resource settings could not routinely use orthopedic battery drills (obd) due to the prohibitive cost of good drills or poor quality of other drills. “hardware” or engineering battery drill (hbd) is a viable alternative to obd. hbd is easy to procure, ru...
Objectives . To upgrade and complement the existing load balancing model in multi-server systems, taking into account hardware characteristics of server equipment, as well most loaded components equipment video conferencing service cluster educational processes distance education. Methods The mathematical a mass exchange system is considered, when significant changes are introduced: penalties f...
this presentation features, modalities: plain radiographs, ct, mri, and ultrasound; arthroplasty; hardware loosening; suture anchor migration; avn, collapse, arthritis; rotator cuff repair; labral repair.
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
Hardware security tokens have now been used for several decades to store cryptographic keys. When deployed, the of corresponding schemes fundamentally relies on tamper-resistance – a very strong assumption in practice. Moreover, even secure tokens, which are expensive and cumbersome, can often be subverted. We introduce new primitive called Encryption with Password-protected Assisted Decryption...
A Novel System Reliability Modeling of Hardware, Software, and Interactions of Hardware and Software
Microarray technology is a new and powerful tool for concurrent monitoring of large number of genes expressions. Each microarray experiment produces hundreds of images. Each digital image requires a large storage space. Hence, real-time processing of these images and transmission of them necessitates efficient and custom-made lossless compression schemes. In this paper, we offer a new archi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید