نتایج جستجو برای: فرمولاسیون ec 128 چریش
تعداد نتایج: 60454 فیلتر نتایج به سال:
This paper is devoted to the non-symmetric channels. Here we will present t-EC-AUED codes. Böinck and van Tilborg gave a bound on the length of binary t-EC-AUED codes. A generalization of this bound to arbitrary alphabet size is given. This generalized Böinck van Tilborg bound, combined with constructions, is used to determine the length of some optimal binary and ternary t-EC-AUED codes. The s...
از آنجایی که داروهای مسکن جایگاه خاصی در مراحل درمانی دارن تاش شد تا با انتخاب یک مسکن برتر در ایران و انجام آزمونه9ایی از قبیل بررسی اندکس هاسنر ، انحلال ، زمان باز شدن و بررسی طول موج بیشینه و... آزمونهای پیش فرمولاسیون و پس فرمولاسیون انجام شود در ادامه از 12 داوطلب واجد شرایط استفاده گردید تا در شرایط برابر به بررس یپارامتر های فارماکوکینتیکی اولیه و ثانویه پرداخته شود و ناهیتا اثبات گردید ...
بیوسورفاکتانت ها مواد کاهش دهنده سطحی بوده که توسط میکروارگانیسم ها تولید می شوند. این مواد از نظر ملاحظات زیست محیطی سالم تر از سورفکتانت های شیمیایی هستند. در این پژوهش کاربرد رامنولیپید در فرمولاسیون یک پودر شوینده مورد بررسی قرار گرفت. این بیوسورفکتانت با سدیم تری پلی فسفات (سازنده) و سدیم سولفات (پرکننده) مخلوط شد و برای شستن پارچه های کتان آلوده شده با مقادیر معینی از روغن خوراکی به کار ب...
The occurrence of caecal nematode, Subulura brumpti has become more common in quails being maintained in commercial farms in Tamil Nadu, India. Two trials were carried out to study the biology and pathology of S. brumpti in quails. In the first trial, eight grower quails were divided into two groups (T1 and T2) comprising of four birds each. The birds belonged to the group T1 was infected with ...
BMP and Wnt signaling pathways play a crucial role in organogenesis, including tooth development. Despite extensive studies, the exact functions, as well as if and how these two pathways act coordinately in regulating early tooth development, remain elusive. In this study, we dissected regulatory functions of BMP and Wnt pathways in early tooth development using a transgenic noggin (Nog) overex...
Data and Methods The study uses data from the 1991 followup of the National Survey of Adolescent Males (NSAM), a nationally representative survey of never-married, noninstitutionalized males aged 15–19. The original wave of face-to-face interviews conducted in 1988 had a response rate of 74%. In the 1991 wave, face-to-face interviews were conducted with 1,676 respondents aged 17–22, for an 89% ...
The objective of the present study is to determine the occurrence of “W” morphology of P100 waveform in Pattern Reversal Visual Evoked Potential (PRVEP) recordings of a cohort of patients having Primary open angle glaucoma. This rural hospital based study was conducted in the Neurophysiology unit of the Department of Physiology, Mahatma Gandhi Institute of Medical Sciences, Sevagram. The study ...
LILI-128 is a stream cipher that was submitted to NESSIE. Strangely, the designers do not really seem to have tried to ensure that cryptanalysis is no easier than by exhaustive key search. We show that there are indeed attacks faster than exhaustive key search. We also demonstrate a related key attack which has very low complexity, and which could be of practical significance if the cipher were...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید