نتایج جستجو برای: f5

تعداد نتایج: 1852  

ژورنال: :مجله تحقیقات دامپزشکی (journal of veterinary research) 2015
فاطمه گلستان یحیی تهمتن الهام معظمیان

زمینه مطالعه: فیمبریه باکتری f5 ( k99) e. coli مهمترین و شایعترین عامل چسبنده ای که تاکنون برروی سویه های اشریشیا کلی درگیر در اسهال گوساله هاشناخته شده است. این باکتری از طریق  توکسین های مقاوم حرارتی (st) سبب اسهال در گوساله های تازه متولد شده می شود. با افزایش نگرانی در مورد گسترش مقاومت های آنتی بیوتیکی، یافتن راه حل جایگزین مانند استفاده از کلی سین ها  ضرورت دارد. کلی سین ها ترکیبات آنتی ب...

2008
JOHN PERRY

This report gives pseudocode for an implementation the F5 algorithm, noting errors found both in Faugère's seminal 2002 paper and Stegers' 2006 undergraduate thesis. It also outlines a relatively easy optimization that, in our experience, produces a substiantial improvement to the algorithm's e ciency.

2015
Jayesh Antony Minakshi Saikia Vinod. V Lekshmi. R. Nath Mohana Rao Katiki M.S.R. Murty Anju Paul Shabna A Harsha Chandran Sophia Margaret Joseph Nishanth Kumar. S Elizabeth Jayex Panakkal Sriramya I. V Sridivya I. V Sophia Ran Sankar S Easwary Rajan Ruby John Anto

Wrightia tinctoria is a constituent of several ayurvedic preparations against skin disorders including psoriasis and herpes, though not yet has been explored for anticancer potential. Herein, for the first time, we report the significant anticancer properties of a semi-purified fraction, DW-F5, from the dichloromethane extract of W. tinctoria leaves against malignant melanoma. DW-F5 exhibited a...

Journal: :Journal of Symbolic Computation 2021

Let K be a field equipped with valuation. Tropical varieties over can defined theory of Gröbner bases taking into account the valuation K. Because use valuation, tropical has proved to provide settings for computations polynomial rings p-adic that are more stable than classical bases. Beforehand, these strategies were only available homogeneous polynomials. In this article, we extend F5 strateg...

Journal: :Des. Codes Cryptography 2003
Iliya Bouyukliev Juriaan Simonis

We present some results on almost maximum distance separable (AMDS) codes and Griesmer codes of dimension 4 over F5. We prove that no AMDS code of length 13 and minimum distance 5 exists, and we give a classification of some AMDS codes. Moreover, we classify the projective strongly optimal Griesmer codes over F5 of dimension 4 for some values of the minimum distance.

2017
Nir Lipovetzky Hector Geffner

It has been shown recently that heuristic and width-based search can be combined to produce planning algorithms with a performance that goes beyond the state-of-the-art. Such algorithms are based on best-first width search (BFWS), a plain best-first search set with evaluations functions combined lexicographically to break ties, some of which express noveltybased preferences. In BFWS(f5), for ex...

Journal: :Molecular medicine reports 2015
Tae-Ho Kim Seung-Hoon Baek Jeong Ok Lim Sang-Han Lee Shin-Yoon Kim

Osteonecrosis of the femoral head (ONFH) is characterized by the death of the cellular portion of the femoral head due a reduction or disruption in the blood supply. Certain studies have implicated coagulation disorders, including thrombophilia and hypofibrinolysis, in the pathogenesis of ONFH. The factor V (F5) Leiden mutation has been suggested to be a genetic risk factor for venous thromboem...

Journal: :Vision Research 2001
Sérgio S Fukusima Jocelyn Faubert

Visual performance for judging the length of a simultaneously presented pair of radial lines, reciprocally opposed by 180 degrees at a central fixation point, was assessed for 24 radial positions of test lines, for three viewing conditions (binocular, left and right monocular) and five different standard line sizes (1.43-7.13 degrees ). Generally, the results showed underestimation of the test ...

Journal: :The Journal of neuroscience : the official journal of the Society for Neuroscience 2013
Sebastian J Lehmann Hansjörg Scherberger

Voluntary movements are frequently composed of several actions that are combined to achieve a specific behavior. For example, prehension involves reaching and grasping actions to transport the hand to a target to grasp or manipulate it. For controlling these actions, separate parietofrontal networks have been described for generating reaching and grasping actions. However, this separation has b...

2013

Applications running across networks encounter a wide range of performance, security, and availability challenges that can cost organizations an enormous amount in lost productivity, sales, and damage to reputations. F5* addresses these challenges with an intelligent services framework that delivers a set of extensible and programmable application delivery services on the F5 BIG-IP Application ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید