نتایج جستجو برای: recovery mechanisms

تعداد نتایج: 726925  

2014
Shona L. Halson

1 KEY POINTS • Recovery is becoming increasingly important to the high-performing athlete in a bid to reduce fatigue and enhance performance. • Some of the more common recovery techniques utilised by athletes include hydrotherapy, active recovery, stretching, compression garments and massage. • In the previous 5-10 years, there has been a significant increase in research examining both the effe...

Journal: :Indian journal of physiology and pharmacology 2005
Rajinder K Gupta Mohammad Fahim

Sudden blood loss of moderate degree causes fall in blood pressure, which is compensated to certain extent by baroreceptor mediated rise in heart rate and vasoconstriction. In case of severe haemorrhage fall in blood pressure is accompanied by bradycardia indicating failure of baroreceptor mediated recovery in blood pressure. In such conditions partial recovery in the blood pressure with time i...

2006
George Apostolopoulos

IP networks have to carry increasingly more mission critical traffic where outages even of very short duration are undesirable or in some cases unacceptable. Traffic disruptions occur when the topology of the network changes either due to failures or reconfiguration. In connectionless networks current methods for protecting traffic from network failures rely on tunneling mechanisms for directin...

2015
Corey Baham Victoria Kisekka

A critical component of disaster recovery planning is testing, which involves verification of the effectiveness of the DR solutions. Currently, there are several limitations that plagues disaster testing efforts such as the inability to create realistic disaster scenarios and test them in a production environment. Cyber Range Concept of Operations (CONOPS) presents an opportunity for overcoming...

2007
Amir Reza Razavi Sotiris Moschoyiannis Paul J. Krause

Concurrency control mechanisms such as turn-taking, locking, serialization, transactional locking mechanism, and operational transformation try to provide data consistency when concurrent activities are permitted in a reactive system. Locks are typically used in transactional models for assurance of data consistency and integrity in a concurrent environment. In addition, recovery management is ...

Journal: :Science translational medicine 2015
Lucia Friedli Ephron S Rosenzweig Quentin Barraud Martin Schubert Nadia Dominici Lea Awai Jessica L Nielson Pavel Musienko Yvette Nout-Lomas Hui Zhong Sharon Zdunowski Roland R Roy Sarah C Strand Rubia van den Brand Leif A Havton Michael S Beattie Jacqueline C Bresnahan Erwan Bézard Jocelyne Bloch V Reggie Edgerton Adam R Ferguson Armin Curt Mark H Tuszynski Grégoire Courtine

Experimental and clinical studies suggest that primate species exhibit greater recovery after lateralized compared to symmetrical spinal cord injuries. Although this observation has major implications for designing clinical trials and translational therapies, advantages in recovery of nonhuman primates over other species have not been shown statistically to date, nor have the associated repair ...

2007
Amund Kvalbein

The Internet is increasingly used to transport time-critical traffic. Applications like video conferencing, television, telephony and distributed games have strict requirements to the delay and availability offered by the underlying network. At the same time, connectivity failures caused by failures in network equipment is a part of everyday operation in large communication systems. The traditi...

Journal: :the modares journal of electrical engineering 2004
arash - dana ahmad - khademzadeh mohammad esmail kalantari kambis badiei

the current internet inherently has a degree of survivability due to the connection less ip protocol. dynamic routing protocols are designed to react to faults by changing routes when routers learn about topology changes via routing information updates (e.g., link status advertisements). loss of quality of service (qos) has not been an issue because current internet traffic is the best-effort. ...

2015
Rebecca Smith Scott Rixner

Peripherals fail. Yet, modern embedded systems largely leave the burden of tolerating peripheral failures to the programmer. This paper presents Phoenix, a semi-automated peripheral recovery system for resourceconstrained embedded systems. Phoenix introduces lightweight checkpointing mechanisms that transparently track both the internal program state and the external peripheral state. These mec...

2001
Konstantinos Rantos Chris J. Mitchell

This paper investigates interoperability problems arising from the use of dissimilar key recovery mechanisms in encrypted communications. The components that can cause interoperability problems are identified and a protocol is proposed where two communicating entities can negotiate the key recovery mechanism(s) to be used. The ultimate goal is to provide the entities a means to agree either on ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید