نتایج جستجو برای: lock down
تعداد نتایج: 223518 فیلتر نتایج به سال:
چکید ه سابقه و هدف: بیمارانیک ه از پرمکت جهت همودیالیز استفاده میک نند گاهاً دچار عفون تهای وابسته به کاتتر می شوند که می تواند منجر به خروج کاتتر در این بیماران شود. این مطالعه جهت ارزیابی اثر وانکومایسین داخل کاتتر در مقایسه با آنتی بیوتیک وریدی در درمان این عفونت هاانجام شده است. مواد و رو شها: این مطالعه تحقیقاتی روی 67 بیمار دچار بیماری esrd که با عفونت پرمکت در بیمارستان الزهرااصفهان از سا...
We develop an SIR-macroeconomic model with virus detection and inequality to study their implications for economic health consequences during a pandemic crisis. find two-way relationship between the recession that exacerbate each other although such vicious circle could be broken by accurate extensive testing. This mitigation effect can improved given complementary arrangements as social protec...
هدف از این پایان نامه بررسی منطق mcml و مقایسه آن از لحاظ توان مصرفی و سرعت با منطقهای دیگر از جمله cpl، coms و domino می باشد.نتایج بدست آمده نشان می دهد ، جمع کننده های 8بیتی با تکنیک carry-lock-ahead(cla) و منطقهای cpl,modl و dymcml طراحی شده و آنها را از لحاظ توان مصرفی و سرعت مقایسه شده اند.
The exibility of nested transactions is generally provided at the expenses of a more complex locking mechanism which must deal with expensive lock inheritance. In this paper, we give a solution for eecient lock inheritance. Our solution does not change the original nested transaction model but does revisit its locking rules using set-oriented semantics. This allows us to trade the cost of lock ...
Fine-grained lock protocols with lock modes and lock granules adjusted to the various XML processing models, allow for highly concurrent transaction processing on XML trees, but require locking facilities that efficiently support large and deep hierarchies with varying fan-out characteristics. We discuss these and also further requirements like prefix-based node labels, and present a lock manag...
Based on loosely coupled services in an XML engine, we describe how to realize fine-grained lock protocols, which can guarantee transaction isolation for applications using different language models. We illustrate the superiority of the taDOM lock protocol family and its tailormade lock modes and lock granules adjusted to the XML language model. We emphasize the importance of a prefix-based nod...
The 28 lock and dams sites on the upper Mississippi River is currently central to transporting U.S. agricultural commodities to the world market. This aging lock and dam system and slow double lockage process at the 600-foot locks have generated concern about its navigational efficiency. The objective of this study is to examine the determinants of delay occurred at the lock and dam system on t...
Synchronization overhead may limit the number of applications that can take advantage of a shared-memory abstraction on top of emerging network of workstation organizations. While the programmer could spend additional efforts into getting rid of such overhead by restructuring the computation, this paper focuses on a simpler approach where the overhead of lock operations is hidden through lock p...
A fast-lock and portable all-digital delay-locked loop (ADDLL) with 90◦ phase shift and tunable digitally-controlled phase shifter (DCPS) for DDR controller applications are presented. The ADDLL can achieve small phase-shift error in 1.3◦ at 400MHz and locking time of less than 13 clock cycles, making it very suitable for low-power DDR controller with power-down mode. The proposed DCPS provides...
Internet applications are being used for more and more important business and personal purposes. Despite efforts to lock down web servers and isolate databases, there is an inherent problem in the web application architecture that leaves databases necessarily exposed to possible attack from the Internet. We propose a new design that removes the web server as a trusted component of the architect...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید