نتایج جستجو برای: broussonetia papyrifera

تعداد نتایج: 498  

2014
Minha Park Okyeon Yi

There are various services using mobile devices due to development of communication technology and mobile equipment, regardless of time and place. To secure usage of convenience and smart services, authentication between users’ devices and network is necessary. To achieve this, many researches have been studied about 3 rd Generation Partnership Project Authentication and Key Agreement (3GPP-AKA...

Journal: :AJNR. American journal of neuroradiology 2007
P Ou P Schmit W Layouss D Sidi D Bonnet F Brunelle

BACKGROUND AND PURPOSE Preoperative localization of the artery of Adamkiewicz (AKA) may be useful in selected children in prevention of ischemic spinal complications of spinal or thoracoabdominal aortic surgery. The aim of our study was to investigate the ability of 64-section CT for assessing the AKA in children. MATERIALS AND METHODS Forty children (mean age, 7.5 +/- 5 years) underwent thor...

2012
Min Zhang Yanming Fang Zhenhai Liang Libin Huang

Vacuolar H(+)-ATPase (V-H(+)-ATPase) may play a pivotal role in maintenance of ion homeostasis inside plant cells. In the present study, the expression of V-H(+)-ATPase genes was analyzed in the roots and leaves of a woody plant, Broussonetia papyrifera, which was stressed with 50, 100 and 150 mM NaCl. Moreover, the expression and distribution of the subunit E protein were investigated by Weste...

Journal: :Cancer research 1979
T R Beardsley E F Hays

AKA mice were inoculated with Gross mumine leukemia virus at 3 days of age. Such treatment results in thymic lymphoma in all animals between 8 and 12 weeks of age. Normal AKA mice develop the disease after 28 weeks of age. In this study, virus-treated (AKA-V) and normal (AKR N) mice were compared. Thymic weights, histology, and cell density as well as functional and mitogen assays of thymocytes...

2014
Neetesh Saxena Narendra S. Chaudhari

In this paper, we propose an improved and efficient AKA protocol named “NS-AKA” to prevent the 3G UMTS networks from various attacks like man-in-the-middle attack, redirection attack, replay attack and active attacks in the corrupted UMTS networks. This protocol completely eliminates the need of synchronization between a mobile station and its home network, and protects the actual identity of e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید