U-turn

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy U-turn in Germany

Following the disaster at Fukushima-Daiichi, chancellor Angela Merkel decided to speed up rather than slow down Germany's exit from nuclear power.

متن کامل

Autoantibodies make a U-turn

Like the immune response itself, our efforts to understand the "rules" for self-nonself discrimination are constantly evolving. The discovery of pattern recognition receptors-the Toll-like receptor (TLR) family in particular-shifted the emphasis of self-nonself recognition from lymphocytes functioning in the adaptive immune system to antigen-presenting cells (APCs) functioning in the innate imm...

متن کامل

Intraoropharyngeal U-turn method using transnasal esophagogastroduodenoscopy.

The more progress that has been made in endoscopy, the more superficial cancers have been found in the head and neck regions [1–4]. There are, however, some areas that are difficult to observe on transoral esophagogastroduodenoscopy (EGD). In particular, only a tangential view of the radix linguae is obtained with transoral EGD. In this report, we present the procedure for an intraoropharyngeal...

متن کامل

Simulating the Effect of Speed Humps on the U-Turn Traffic

Traffic simulation represents an effective tool for evaluating the suggested alternatives to enhance traffic conditions prior to their application in real sites. U-turn sections represent examples of the complicated sections that cannot be analyzed properly without applying microsimulation approach.  Recently, in Iraq, speed humps were applied in prior to the merging locations and U-turn sectio...

متن کامل

U-turn to Java Card Byte Code Verification

Java is the ideal development platform for mobile code systems. It ensures application portability and mobility for a variety of platforms, while providing strong security features. The intermediate code (byte code) allows us to verify statically (i.e. during loading phase) that the program is trustworthy. This is done by a software security module called the byte code verifier. Given the compl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: British Dental Journal

سال: 2009

ISSN: 0007-0610,1476-5373

DOI: 10.1038/sj.bdj.2009.15