نتایج جستجو برای: bypassing

تعداد نتایج: 3464  

2011
Sunjoo Hong Taehwan Roh Hoi-Jun Yoo

A low-power parallel multiplier based on optimized bypassing architecture (OBA) is proposed. The proposed OBA has two kinds of adder cells to reduce power consumption by 15.7 %. One is the two-dimensional bypassing adder (TDBA) which performs both row and column bypassing scheme simultaneously, and the other is the modified row-bypassing adder (MRBA) for the proposed row-bypassing scheme. In th...

Journal: :International Journal of Modern Physics A 2005

Journal: :Science-Business eXchange 2010

Journal: :Digital Investigation 2010

Journal: :iranian journal of pharmaceutical sciences 0
abdol majid cheraghali bms university mina golestani 1school of pharmacy, shahid beheshti university of medical sciences, tehran, ir iran, iranian center of excellence in health management peyman eshghi 2pediatric congenital hematologic disorders research center, shahid beheshti university of medical sciences, tehran, ir iran, [email protected] hamidreza rasekh 4school of pharmacy, shahid beheshti university of medical sciences, tehran, ir iran, [email protected] jamshid salamzadeh 5school of pharmacy, shahid beheshti university of medical sciences, tehran, ir iran,[email protected] ali imani 6iranian center of excellence in health management, faculty of management and medical informatics, tabriz university of medical sciences, tabriz, ir iran, [email protected]

bypassing agents are the most commonly used medicines for the treatment of hemophilia patients with inhibitors. the aim of this study is to identify the cost components of management of bleeding vents in hemophilia patients with inhibitors in iran. this study is a cross-sectional study using a bottom-up approach to determine the cost components of treatment of hemophilia patients with inhibitor...

Journal: :Nature Geoscience 2017

Journal: :Neurosurgery 2012

2015
Morton Christiansen Carlos Cid

While most other areas of penetration testing are well understood, and their methodologies well documented, little information regarding testing and bypassing malware defenses is available in the public domain. Still, malware incidents remain the most expensive type of incidents caused by outsiders, while also being the most frequent type of incidents occurring to organizations. In addition, si...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید