نتایج جستجو برای: درگاه usb

تعداد نتایج: 5036  

Journal: :International Journal of Recent Contributions from Engineering, Science & IT (iJES) 2015

2010
Mayy Chahla Michael Eberlein Scott Wright

BACKGROUND The acquisition of new knowledge is a primary goal of residency training. Retrieving and retaining influential primary and secondary medical literature can be challenging for house officers. We set out to investigate the effect of a Universal Serial Bus (USB) drive loaded with landmark scientific articles on housestaff education in a pilot study. METHODS We created a USB syllabus t...

2015
Yu Lu Zhong Liang Chen Yue

This paper introduced fingerprint recognition to protect USB Key’s pin number. Pin number is easily stolen and sometimes it’s too hard to keep in mind. To overcome these problems, a fingerprint key based USB Key pin number protection system has been proposed. Using biometric like fingerprint to protect USB Key pin number improves security and convenience of users. And the fingerprint key is gen...

2003
Tianbo Kuang Fang Xiao Carey Williamson

Researchers have long realized that TCP performance degrades over wireless links. Many solutions, including link-layer error recovery, have been proposed to overcome this problem. This paper studies how these solutions perform in a wireless LAN network environment. The experiments are conducted using off-the-shelf products, in a controlled way. In particular, we focus on Linux 2.4 TCP performan...

2016
ZiYing Wu Chong Zhang Peng Zhang TianWu Chen ShiYi Chen JiWu Chen

Purpose. To compare the biomechanical properties of 3 suture-bridge techniques for rotator cuff repair. Methods. Twelve pair-matched fresh-frozen shoulder specimens were randomized to 3 groups of different repair types: the medially Knotted Suture Bridge (KSB), the medially Untied Suture Bridge (USB), and the Modified Suture Bridge (MSB). Cyclic loading and load-to-failure test were performed. ...

2010
Dung Vu Pham Malka N. Halgamuge Ali Syed Priyan Mendis

Malware replicating via USB storage devices including worms, virus, Trojan horses and other malicious codes together with USB based hack tools such as Pod Slurp and USB Switchblade have accounted for many serious security issues for the last few years. The majority of these malicious codes exploit Windows Autoplay features to automatically launch attacks on host computers transparently to the u...

سعید رضائی شریف‌آبادی, فاطمه ذاکری‌فرد

هدف: پژوهش حاضر عناصر درگاه‌های دانش، در درگاه‌های دانشگاهی خارجی را ارزیابی و برای طراحی درگاه‌های دانشگاهیِ دانش‌مدار الگویی ارائه کرده است. روش/ رویکرد پژوهش: با استفاده از سیاهه ارزیابی محقق‌ساخته (شامل 33 عنصر درگاه دانش)، 19 درگاه بررسی شده است. یافته‌ها: از 19 درگاه دانشگاهی مورد مطالعه، درگاه دانشگاه ادینبورگ دارای 21 عنصر؛ آتاباسکا و بوفالو دارای 20 عنصر؛ لازال، راتگرز، و تکنولوژی ویر...

Journal: :Wireless Personal Communications 2014
Jin-Woo Kim Kyeong Hur Seong-Ro Lee

Wireless USB (WUSB) is the USB technology merged with WiMedia PHY/MAC. WUSB can be applied to WPAN applications as well as PAN applications like wired USB. However the current WUSB protocol can’t provide resource allocation scheme to respond to changes of available resource as well as resource allocation scheme for saturated wireless channel. This problem causes the critical problems in QoS pro...

2015
Scott C Hau Vasilios Papastefanou Shima Shah Mandeep S Sagoo Marie Restori Victoria Cohen

AIMS To compare anterior segment optical coherence tomography (AS-OCT) with ultrasound B-scan (USB) in evaluating iris and iridociliary body lesions. METHODS Image features and resolution comparison between AS-OCT and USB in 126 patients (126 eyes) presenting with iris or iridociliary body lesion. Bland-Altman plots were generated to assess the level of agreement between the two techniques. ...

Journal: :JSW 2014
Anil Kumar Karna Yuting Chen

An operating system is the main interface for human beings to interact with computer, use its resources and run their favorite applications or do their professional work. Lots of operating systems are available for a personal computer and end users have their own choice to select one or more out of these systems. Having numerous choices for an operating system selection, and having different ed...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید