نتایج جستجو برای: anastomostic leakage

تعداد نتایج: 30781  

2004
Rahul M. Rao Richard B. Brown Kevin Nowka Jeffrey L. Burns

Conventional leakage reduction techniques focus primarily on sub-threshold leakage mitigation, while neglecting the effect of gate leakage current. This work focuses on understanding gate leakage current and developing circuit techniques for total leakage minimization. We present an efficient technique for gate leakage of CMOS circuits. Input vector control and circuit reconfiguration technique...

1999
Paul V. Johnson

ost people consider unaccounted-for water and leakage to be the same thing. They are not. Leakage is a part, and sometimes a large part, of unaccounted-for water, but it is just one piece of the puzzle. Unaccounted-for water is the difference between the amount of water produced, or purchased, and the amount of water sold to all customers. Unaccounted-for water includes underground leakage; una...

Journal: :Computers in Industry 2011
Da Yong Zhang Yong Zeng Lingyu Wang Hongtao Li Yuanfeng Geng

Modeling and Evaluating Information Leakage Caused by Inferences in Supply Chains

2006
Mariagiovanna Baccara Ronny Razin

We analyze a model of bargaining over new ideas. The model accounts for the problem of information leakage, i.e., the diffusion of information about the idea before and after the idea is implemented. We analyze the effects of information leakage on the distribution of rents within firms and the firms’ stability to the introduction of innovation. In the model, the distribution of rents in a firm...

2012
Vassilios Lekakis Yunus Basagalar Pete Keleher

A “home” sharing environment consists of the data sharing relationships between family members, friends, and acquaintances. We argue that this environment, far from being simple, has sharing and trust relationships as complex as any general-purpose network. Such environments need strong access control and privacy guarantees. We show that avoiding information leakage requires both to be integrat...

1998
Donald B. Keim Ananth Madhavan

This article develops a model of the upstairs market where order size, beliefs, and prices are determined endogenously. We test the model’s predictions using unique data for 5,625 equity trades during the period 1985 to 1992 that are known to be upstairs transactions and are identified as either buyer or seller initiated. We find that price movements prior to the trade date are significantly po...

Journal: :IEEE Access 2023

Signature can be used to verify the integrity of both a message and identity signer, whereas encryption ensure confidentiality message. In past, cryptography researchers have studied proposed numerous certificateless signcryption (CLSC) schemes combine benefits signature encryption. However, these may not robust enough withstand side-channel attacks. Through such attacks, an attacker constantly...

2017
Michael J. Allingham Dibyendu Mukherjee Erin B. Lally Hossein Rabbani Priyatham S. Mettu Scott W. Cousins Sina Farsiu

PURPOSE We use semiautomated segmentation of fluorescein angiography (FA) to determine whether anti-vascular endothelial growth factor (VEGF) treatment for diabetic macular edema (DME) differentially affects microaneurysm (MA)-associated leakage, termed focal leakage, versus non-MA-associated leakage, termed diffuse leakage. METHODS We performed a retrospective study of 29 subjects treated wi...

حسن زاده, ناصر, دانائی, محمد,

CMOS switches are one of the main components of today's analog circuits. Among the many types of non-idealities that can affect the performance of the switch, its leakage current is of utmost importance. In order to reduce the leakage current or equally increase the OFF resistance of any switch, a novel technique is presented in this paper. The proposed technique employs the body effect to incr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید