نتایج جستجو برای: b lock e xogeneity

تعداد نتایج: 1819180  

2001
David Duarte Narayanan Vijaykrishnan Mary Jane Irwin

A PLL power model that accurately estimates the power consumption during both lock and acquisition states is presented. The model is within 5% of circuit level simulation (SPICE) values. No significant power overhead (+/5% of the power consumed at the final frequency) is incurred during the acquisition process. 1. The PLL dynamic behavior The PLL can be described as a 2 order continuous time sy...

ژورنال: علوم آب و خاک 2005
داود مؤمنی آبخارکی, , برات قبادیان, , عباس همت, , سعید مینایی, ,

Differential lock is a means of improving tractor performance. This system causes the revolution of the axles to become equal. It, improves traction, decreases abrasion of drive tires, improves fuel consumption, and increases tractor work rate. Despite advantages of the system, differential lock has not been optimized in Iran. Thus, a semi-automatic differential lock system for MF-285 tractor w...

Journal: :نشریه پرستاری ایران 0
اکرم قائم مقامی akram ghaemmaghami

by drawing blood through a heparin lock, patients can be protected from skin damages duo to repeated needle sticks. in addition, this procedure can assist to gain more precise results in laboratory test and to prevent further complications. probably, you have ever used a heparin lock in order to infusion of medicines but, it is possible that you never use of that for blood sampling. both two pr...

2006
António D. Reis José F. Rocha Atilio S. Gameiro José P. Carvalho

1 The PLL (Phase Lock Loop) can synchronize with a deterministic input wave or with a random input symbols. In the first case we have a WPLL (Wave Phase Lock Loop) and in the second case we have a SPLL (Symbol Phase Lock Loop. The WPLL (Wave Phase Lock Loop) is also known as WLL (Wave Lock Loop) or only PLL (Phase Lock Loop). The SPLL (Symbol Phase Lock Loop) is also known as SLL (Symbol Lock L...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1394

کلمات کلیدی: پیریمیدین، پیریمیدوتیازین، تیازپین، لیپواکسیژناز در بخش اول این پژوهش سنتز مشتقات جدیدی از سیستم هفت عضوی جدید پیریمیدو ]?4, ?5: 2,3[ ]1,4[ تیازپینو ]7, 6-b [ کینولین ها ی (a-f 7) با استفاده از واکنش حلقه زایی بین 5-آمینو-6-متیل پیریمیدین-4-تیول های ( a, b5) و مشتقات 2-کلروکینولین-3-کربالدهید (c- a6) گزارش شد. برای این منظور ابتدا سنتز هسته ی پیریمیدین 5-آمینو-6-متیل پیریمیدین-4-ت...

1995
Shigekazu Inohara Yoji Shigehata Keitaro Uehara Hajime Miyazawa Kouhei Yamamoto Takashi Masuda

New app1ication.a th.at support cooperative work of users on. distributed computers often share perai9ten.t data atru.cturea that con,tain poinders. For th.eae app1ication.a. th,e un.derlyin,g system, often wea th,e “page aenler” arch,itecture. in which th,e persistent data are ah.ipped from th.e server on a page basis, ad clients cache th,e pagea for object-grain accesses. In this pagegrain. e...

Journal: :J. Artificial Societies and Social Simulation 2008
Marc R. H. Roedenbeck Barnas Nothnagel

When are we locked in a path? This is one of the main questions concerning path dependency. Coming from Arthur's model of increasing returns and technology adoption (Arthur 1989), this paper addresses the question of when and how a lock-in occurs. To gain a better understanding of the path process, different modifications are made. First, the random selection of two types of adopters is substit...

Journal: :IEEE Trans. Parallel Distrib. Syst. 1997
Theodore Johnson Krishna Harathi

In this paper, we present the PR-lock, a prioritized spin-lock mutual exclusion algorithm for real time systems. The PR-lock is a contention-free spin lock, in which blocked processes spin on locally stored or cached variables. In contrast to previous work on prioritized spin locks, our algorithm maintains a pointer to the lock holder. As a result, our spin lock can support priority inheritance...

Journal: :Security Dialogue 2023

The UK government’s e-Borders project presents an intriguing anomaly: despite repeated and acknowledged failings of the over two decades, it has remained a core part border strategy across successive administrations. This article seeks to explain surprising resilience this programme by developing concept political lock-in. We combine insights from critical security studies with science technolo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید