نتایج جستجو برای: memory de duplication

تعداد نتایج: 1802836  

2012
Ashok Kumar Yadav Srinivasulu Srinivasulu Tadisetty

Iris recognition is the most accurate of the top three biometrics: fingerprints, facial recognition, and iris recognition. Iris recognition has a false accept rate of 1 in 1.2 million for one eye (1 in 1.44 trillion for two eyes) regardless of database size [1]. Iris recognition is the easiest one among biometrics related with the eye. It works with simple CCD camera and does not need direct co...

1981
Fred J. Taylor

A memory protection technique is described in which individuallycode-protected memory cells are supplemented with redundant memory cellsderived from the basic cells according to the rules of a short constraint lengthconvolutional code. The technique is found to be far more protective againstfaults than memory duplication. The method of clearing up faults is extremelysimple-o...

Journal: :IJISP 2017
Prakash Mohan Saravanakumar Chelliah

Objective: The main aim is to de-duplicate the redundant files in the cloud and also to improve the security of files in public cloud service by assigning privileges to the documents when it is uploaded by confidential user. Methods: To achieve the objective the authors have used the AES algorithm to encrypt the file stored after de-duplication in the cloud. De-duplication is done based on comp...

Journal: :Current Biology 2001
Wallace F Marshall Yvonne Vucica Joel L Rosenbaum

BACKGROUND Centriole duplication is a key step in the cell cycle whose mechanism is completely unknown. Why new centrioles always form next to preexisting ones is a fundamental question. The simplest model is that preexisting centrioles nucleate the assembly of new centrioles, and that although centrioles can in some cases form de novo without this nucleation, the de novo assembly mechanism sho...

2002
Stéphane Drapeau Claudia Roncancio Pascal Dechamboux

The RS2.7 Replication Framework revisits the replication function in order to provide a component-based middleware support that can adapt to several kind of environment. It clearly identifies what minimal functions are relevant to replication: binding replicas between themselves, and synchronizing them in order to support the right levels of coherency. This paper focuses on the coherency issue....

Journal: :Sultan Qaboos University medical journal 2015
Achandira M Udayakumar Watfa Al-Mamari Abeer Al-Sayegh Adila Al-Kindy

The duplication of the short arm of chromosome 7 as de novo is extremely rare. The phenotype spectrum varies depending on the region of duplication. We report a case of de novo duplication of chromosomal region 7p21.1p22.2 in a three-year-old male child with autism who presented to the Sultan Qaboos University Hospital in Muscat, Oman, in January 2012. The patient was diagnosed with craniofacia...

2015
Omar Toumi Hiba Ben Hssine Faouzi Noomen Sadok Ben Jabra Ibtissem Korbi Ali Abdelmoula Mayada Trimech Wafa Ben Mansour Boughanmi Faiez Mohamed Ben Khlifa Hatem Rabah Ammar Mahmoudi Mohamed Nasr Khadija Zouari Hammouda Saffar Abdel Aziz Hamdi

Les duplications de l'appareil digestif sont les malformations congénitales rares qui peuvent toucher tout l'appareil digestive depuis la bouche jusqu' à l'anus. Certaines duplications sont asymptomatiques et sont diagnostiqués dans la plupart des cas pendant l'enfance. La prise en charge de la duplication gastrique est essentiellement chirurgicale. Le traitement de choix est l'exérèse complète...

Journal: :Cell 2009
Mónica Bettencourt-Dias David M. Glover

an d d up lic at io n SPD2 (Ce, Dm)/ CEP192 (Hs) No centriole duplication (Ce); <PCM recruited (Ce, Dm, and Hs); no basal body duplication (Dm) Asterless (Dm)/ CEP152 (Dr, Hs) Aberrant PCM recruitment (Dm) and centriole duplication (Dm and Dr) γ-Tubulin (Dm, Hs, Tt, Pt)/TBG (Ce) Aberrant centriole duplication (Ce, Hs, Tt), centriole structure and separation (Pt, Dm) Overexpression: de novo form...

2016
Harshita Sharma

The explosive growth of data produced by different devices and applications has contributed to the abundance of big data. To process such amounts of data efficiently, strategies such as De-duplication has been employed. Among the three different levels of de-duplication named as file level, block level and chunk level, De-duplication at chunk level also known as byte level is the most popular a...

Journal: :IEEE Trans. Computers 1996
Nitin H. Vaidya

A large number of choices exist when designing a reliable memory system. The choices range from simple replication to complex error control codes (ECC). An intermediate solution is to use combination of replication and simple ECC. Such a system consists of multiple memory modules, data stored in each module being encoded using an ECC. This paper compares reliability of memory systems formed usi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید