intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

A protected method

Xem 1-13 trên 13 kết quả A protected method
  • Food fraud, particularly in staple commodities like rice, poses significant risks to trademark protection as well as economic challenges. In this study, we explored the efficacy of Raman spectroscopy in differentiating authentic ST25 rice-a premium variety of Vietnam from other rice types, amidst concerns of adulteration.

    pdf9p viaburame 14-03-2025 6 1   Download

  • This study was aimed to: (1) develop a rapid assessment method to control the impact of plastic waste on aquatic life and water quality in various water bodies; and, (2) contribute the development and refinement of a comprehensive set of monitoring tools and indicators, particularly for field research and rapid assessments.

    pdf7p viyamanaka 06-02-2025 3 1   Download

  •  Technical Seminar Effective solutions for motor starting and protection presents about IEC Standard and Motor Starting Methods; effective solutions for motor starting and protection motor protection agenda; motor protection manual motor starters ms132 rated ultimate short circuit breaking capacity; main electrical parameters of motors and somethings else.

     

     

     

    pdf28p ducxt1995 15-05-2015 44 6   Download

  • This research investigates the relationship between post fault transient overvoltages and the functionality of the digital distance protection. The study is conducted in a 66kV network with a neutral earth resistor as method to earth the power system. This paper begins by performing an extensive power system analysis on ground fault transient overvoltages. The study is conducted by using the PSCAD-EMTC software package.

    pdf180p runthenight07 01-03-2023 13 3   Download

  • In this article the work of the components of information of protection tools on the occurring violations, their types and the elimination of these violations and the possible trajectory of a change over time of the functioning states of information of protection tools with a discrete time are researched.

    pdf10p lucastanguyen 01-06-2020 24 3   Download

  • In this paper, to enhance the safety of these lines, response of a buried 56-inch diameter high pressure natural gas pipeline to a surface blast was numerically investigated. Besides, the effects of: i) explosive mass, ii) pipeline thickness, iii) burial depth and iv) concrete protective layer on pipeline deformation were parametrically studied.

    pdf20p tohitohi 19-05-2020 34 1   Download

  • This study will be achieved by aiming to: Build the analytical procedure of determination of mercury species in sediment using selective extraction technique . Assess of the reliability of the method of determination of mercury speciation in sediment. Apply the result of study to determine forms of mercury in sediment at a certain area.

    pdf27p xacxuoc4321 09-07-2019 25 6   Download

  • This paper proposes an efficient division algorithm protected against simple side-channel analysis. The proposed algorithm applies equally well to software and hardware implementations. Furthermore, it does not impact the running time nor the memory requirements.

    pdf10p dunglh2013 02-04-2014 56 1   Download

  • The Java standard APIs are shown in HTML output at http://java.sun.com/j2se/1.4.2/docs/api/index.html. It’s generated from the documentation comments (doc comments). Documentation comments are special comments in the source code that are delimited by the /** ... */ delimiters. The JDK contains a tool named javadoc to generate HTML documentation from documentation comments in your source file. The javadoc utility extracts information for the following items Public classes and interfaces Public and protected methods Public and protected fields Packages...

    ppt20p huanltgc00061 05-05-2013 56 4   Download

  • Paraplegia remains a potential complication of spinal cord ischemic reperfusion injury (IRI) in which oxidative stress induced cyclooxygenase activities may contribute to ischemic neuronal damage. Prolonged administration of vitamin E (α-TOL), as a potent biological antioxidant, may have a protective role in this oxidative inflammatory ischemic cascade to reduce the incidence of paraplegia. The present study was designed to evaluate the preventive value of α-TOL in IRI of spinal cord.

    pdf9p toshiba23 18-11-2011 75 6   Download

  • We observed previously that cisplatin-resistant HeLa cells were cross-resistant to UV light due to accumulation of DDB2, a protein implicated in DNA repair. More recently, we found that cFLIP, which represents an anti-apoptotic protein whose level is induced by DDB2, was implicated in preventing apoptosis induced by deathreceptor signaling. In the present study, we investigated whether DDB2 has a protective role against UV irradiation and whether cFLIP is also involved in this process. Methods: We explored the role of DDB2 in mediating UV resistance in both human cells and Drosophila.

    pdf14p toshiba23 18-11-2011 41 4   Download

  • The microsatellite polymorphism of heme oxygenase (HO)-1 gene promoter has been shown to be associated with the susceptibility to ischemic event, including coronary artery disease (CAD), myocardial infarction, and peripheral vascular disease. We aimed to examine whether the length of (GT)n repeats in HO-1 gene promoter is associated with ischemic stroke in people with CAD risk factors, especially low level of HDL. Methods: A total of 183 consecutive firstever ischemic stroke inpatients and

    pdf9p toshiba23 18-11-2011 48 3   Download

  • [ Team LiB ] Understanding Information Rights Management New to Outlook 2003, Information Rights Management (IRM) enables you to secure a message, including any attachments, to prevent the recipient from printing, forwarding, or copying the message or attachment. The recipient can open the message only after she confirms her identity by logging on to her Passport account. Although there are similarities between digital signatures and IRM, they're two distinct methods you can use to secure your messages. You can digitally sign and encrypt IRM-protected messages.

    pdf2p chutieuchuathieulam 23-07-2010 86 7   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
11=>2