نتایج جستجو برای: exhaustive control

تعداد نتایج: 1342628  

2017
Yu-song Teng Di Wu

BACKGROUND (-)-Epigallocatechin-3-gallate (EGCG) is the most abundant of the green tea polyphenols that exhibit a variety of bioactivities. The objective of this study was to evaluate the anti-fatigue effect of EGCG by forced swimming exercise. MATERIALS AND METHODS The mice were divided into one control group and three EGCG-treated groups. The control group was administered with distilled wa...

1997
He Zhu Ian Watson

This paper reports on constructing an exhaustive full program control ow framework for precise data ow analysis of real programs. We discuss the problem of ambiguous calling relations in the presence of function pointers. A ow insensitive analysis is suggested and implemented for real C programs.

2008
JAMES W. ROBERTS J. W. ROBERTS

Every uniformly exhaustive submeasure is equivalent to a measure. From this, we deduce that every vector measure with compact range in an F-space has a control measure. We also show that co (or any E.-space) is a T;space, i.e. cannot be realized as the quotient of a nonlocally convex F-space by a one-dimensional subspace.

2002
D. Subbaram Naidu

This paper presents an overview of singular perturbations and time scales (SPaTS) in control theory and applications during the period 1984-2001 (the last such overviews were provided by [231, 373]). Due to the limitations on space, this is in way intended to be an exhaustive survey on the topic.

1998
Naftali Schwartz

This article explores the extension of Morgenthaler's Virtual Control Flow techniqueeMor97], which derives control owwASU86] semantics directly from the Abstract Syntax Tree, from the relatively coarse granularity of syntactic C expressions to the ner granularity of basic block expressions, that is, expressions without embedded control ow. We explain why this is a better level of abstraction fo...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده علوم 1391

in this thesis, we consider a mathematical model of cancer with completely unknown parameters. we study the stability of critical points which are biologically admissible. then we consider a control on the system and introduce situations at which solutions are attracted to critical points and so the cancer disease has auto healing. the lyapunov stability method is used for estimating the un...

ژورنال: طب مکمل 2022

Objective: Aerobic training and Saffron has beneficial effects on inflammatory response. The present study aims to investigate the Interactive effect of aerobic training with Saffron extract on serum, tumor necrosis factor-α and C-reactive protein in rats following an aerobic exercise until exhaustion .Methods: This is a clinical trial, 48 Wistar male rats were assigned into following four grou...

E Saifah I Mondranondra R Suttisri T Lohakul

Sauropus androgynus (Euphorbiaceae) is a popular vegetable in Thailand. In 1995, the plant was associated with several cases of poisoning when used in a Taiwanese weight control method and the toxicity was attributed to its alkaloid content. We have therefore investigated a closely related Sauropus species, S. hirsutus. Extraction and isolation of chemical constituents from the aerial part of S...

Journal: :Journal of applied physiology 1999
M A Ceddia J A Woods

This study determined the effects of exercise on the ability of macrophages (Mphi) to present antigen to T cells. Pathogen-free male Balb/c mice (8 +/- 2 wk of age) were randomly assigned to either home cage control, moderate exercise (Mod; 18 m/min, 5% grade, 0.5 h/day), exhaustive exercise (Exh, 18-30 m/min, 3 h/day), or treadmill control groups. The mice underwent treatments for 4 days durin...

Journal: :I. J. Network Security 2009
Hasan Mohammed Hasan Husein Bayoumi I. Bayoumi Fathy Saad Holail Bahaa Eldin M. Hasan Mohammed Z. Abd El-Mageed

Various cryptosystems use exhaustive techniques to search the key space. Such search techniques should be guided in order to be computationally adequate. Here, a Genetic Algorithm, GA, is proposed for the cryptanalysis of DES-like systems to find out the underlying key. The genetic algorithm approach is adopted, for obtaining the exact key by forming an initial population of keys that belong to...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید