منابع مشابه
The accuracy of calculated base excess in blood.
Most equations used for calculation of the base excess (BE, mmol/l) in human blood are based on the fundamental equation derived by Siggaard-Andersen and called the Van Slyke equation: BE = Z x [[cHCO3-(P) - C7.4 HCO3-(P)] + beta x (pH -7.4)]. In simple approximation, where Z is a constant which depends only on total hemoglobin concentration (cHb, g/dl) in blood, three equations were tested: th...
متن کاملWho decides the law of the land?
A cornerstone of American-Indian cultures is a deep sense of interconnectedness with the natural environment. To preserve this sense of interconnectedness on tribal lands, many American Indians believe that sovereignty over environmental affairs on tribal lands is essential. But a number of shortcomings have historically and continually weakened tribal authority, and years of federal neglect ha...
متن کاملCircumvention of fingerprint scanners
One critical issue regarding the protection of confidential information or valuable items is to determine the identity of a person. Biometrics is supposed to offer this security in a user-friendly and secure way. One problem however is that there are ways to compromise systems based on biometric verification. Some of these biometrical features have known vulnerabilities. Persons with similar fa...
متن کاملExcess Entropy Scaling Law for Diffusivity in Liquid Metals
Understanding how dynamic properties depend on the structure and thermodynamics in liquids is a long-standing open problem in condensed matter physics. A very simple approach is based on the Dzugutov contribution developed on model fluids in which a universal (i.e. species-independent) connection relates the pair excess entropy of a liquid to its reduced diffusion coefficient. However its appli...
متن کاملTor’s Usability for Censorship Circumvention
Tor has grown beyond its original purpose as and has since become an important Internet circumvention tool. We specifically examine it usability as a censorship circumvention tool, an essential facet for adoption and use. We focus our analysis on the connection configuration dialog of Tor browser, as censorship circumvention requires correct transport configurations. Our talk will describe a fu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: California Law Review
سال: 1964
ISSN: 0008-1221
DOI: 10.2307/3479213