نتایج جستجو برای: insulated wire
تعداد نتایج: 33751 فیلتر نتایج به سال:
central venous catheterization (cvc) is a commonly performed procedure for venous access. it is associated with several complications. we report a rare case of extra luminal entrapment of guide wire during cvc placement in right jugular vein. we report a case of 28 years old female patient presented in our emergency with history of entrapped guide wire in right side of neck during cvc. x-ray sh...
This paper presents a new method called vespiary regular hexagonal (VRH) model in order to calculate parasitic capacitance between conductor wire filaments of one turn of coil (OTC) and between conductor wire filaments and liner and also total capacitance of one turn of the helix magneto flux cumulative generator (MCG) coil include single-layer conductor wire filaments in form of rectangular cr...
Syringoma is a benign adnexal tumor derived from intradermal eccrine ducts; it predominantly occurs in women at puberty or later in life. Although syringoma is a common benign neoplasm, there have been no effective therapies for its removal. Conventional therapies for syringomas, including surgical excision, electrodessication, chemical peeling, topical atropine or tretinoin, cryosurgery, and l...
A theoretical analysis of insulated internal loopless MRI receivers is presented. Insulated loopless receivers are ideal for local, high resolution imaging of the vasculature and other internal organs. However, there are currently no analysis techniques or design principles for these devices. By using a Galerkin method of moments combined with an application of the volume equivalence theorem, w...
The wire drawing process is extensively used in manufacturing components such as rivet, screw, welding wire, etc. In this work, an analytical of the wire drawing process has been considered for two-stage operation. ABAQUS commercial Finite Element code has been used to obtained the drawing force. Then, The analytical and experimental results been compared. The results show a good agreement for...
Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by secret-key exposures. In our model, the secret k...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید