نتایج جستجو برای: protection efficiency

تعداد نتایج: 561202  

Journal: :Bioconjugate chemistry 2006
Vijaya Gopal Tekkatte K Prasad Nalam M Rao Makoto Takafuji Mohammed M Rahman Hirotaka Ihara

A novel series of cationic amphiphiles based on dialkyl glutamides with cationic pyridinium head group were synthesized as potential gene delivery agents. Four cationic lipids with glutamide as linker and varying chain lengths were tested for their transfection efficiency in three cell lines. The DNA-lipid complexes were characterized for their ability to bind to DNA, protection from nuclease d...

Journal: :Photochemical & photobiological sciences : Official journal of the European Photochemistry Association and the European Society for Photobiology 2011
Denis Fuentealba Katie Thurber Enrico Bovero Tamara C S Pace Cornelia Bohne

Sodium cholate aggregates are adaptable host systems. The effect of changing the ionic strength with the addition of NaCl on the properties for guest binding to sodium cholate aggregates was investigated by using pyrene, perylene and 1-ethylnaphthalene as guests. Fluorescence, anisotropy and laser flash photolysis studies provided information on the protection efficiency of the aggregate bound ...

2016
Vacharee Prashyanusorn Somkuan Kaviya Preecha P. Yupapin

Nowadays traveling has become the significant and profitable industry which creates huge revenue to all countries around the world. Each country has its own characteristics and outstanding features to attract visitors. One of the most important factors that keep the visitors visiting the destination is the security of the place. Security is one of the keys to sustainable tourism as well. To ach...

2014
Q. Yang A. Lim X. J. Ruan X. Qin D. Kim

Location privacy protection in VANETs considers preserving two types of information: the locations and identifications of users. However, existing solutions which either replace identifications by pseudonyms or hide locations in areas cannot be directly applied to geographic routing protocols since they degrade network performance. To address this issue, we proposed a location-preserved content...

2013
Ankur Rai Navneet Singh

The path-segment-protecting p-cycles (“flow p-cycles” for short) have capacity efficiency near that of the Shared Backup Path-Protection (SBPP) scheme currently favoured for optical networking. In this paper a significant extension to the method of p-cycle is introduced for network protection. The Flow p-cycle is use to protect path segments of adjacent workingflow, directly straddle the p-cycl...

Recently, smart grids have been considered as one of the vital elements in upgrading current power systems to a system with more reliability and efficiency. Distributed generation is necessary for most of these new networks. Indeed, in all cases that DGs are used in distribution systems, protection coordination failures may occur in multiple configurations of smart grids using DGs. In different...

2015
Khaled Aldossari

This paper addresses the major challenges that large organizations face in protecting their valuable data. Some of these challenges include recovery objectives, data explosion, cost and the nature of data. The paper explores multiple methods of data protection at different storage levels. RAID disk arrays, snapshot technology, storage mirroring, and backup and archive strategies all are methods...

2007
Riccardo Scarpa Danny Campbell George Hutchinson

A multi-attribute, stated-preference approach is used to value low and high impact actions on four major landscape components addressed by the Rural Environment Protection Scheme in Ireland. Several methodological issues are addressed: the use of prior beliefs on the relative magnitudes of parameters, standardized description of different levels of landscape improvements via image manipulation ...

2006
Kihwan Choi Sunghyun Choi

In the wireless network, both random errors and burst errors do occur due to the channel noise. In order to combat such heterogeneous error patterns, we employ an adaptive error protection based on product code. The proposed product code-based protection in network includes cross-layer protection, because each layer experiences a different type of channel errors. We improve the decoding efficie...

Journal: :IJCNS 2008
Lanfranco Lopriore

With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the microcontroller, interposed between the processor and the storage devices. Our design effort complies with the stringent limitations existing in these architectures in terms of hardwa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید