نتایج جستجو برای: vertical buffer
تعداد نتایج: 136620 فیلتر نتایج به سال:
this paper analyzes renewal input state dependent queue with $n$- policy wherein the server takes exactly one vacation. using the supplementary variable technique and recursive method, we derive the steady state system length distributions at various epochs. various performance measures has been presented. finally, some numerical computations in the form of graphs are presented to show the par...
the present study is aimed at the overall improvement in the efficacy, reduced toxicity and enhancement of therapeutic index of cisplatin. nanocapsules of cisplatin containing ethylcellulose have been prepared using solvent evaporation technique under ambient conditions. the prepared nanocapsules were used for controlled drug release of anticancer agents with gold and iron oxide nanoparticles. ...
liver injury induced by viruses, chemicals and drugs can be protected by different medicinal plants. feijoa sellowiana (myrtaceae) is an evergreen bush native to southern areas of south america, as well as iran where the fruits are very popular. feijoa has shown a potent antimicrobial effect. morever, the antioxidant activity of total feijoa extract has also been reported. mdma or ecstasy is a ...
To identify preoperative factors which influence the effectiveness of strabismus surgery in adults, we retrospectively reviewed the records of 179 patients > 15 years old (131 with exotropia, 48 with esotropia) who had had combined recession and resection surgery for correction of horizontal strabismus. Eighteen preoperative variables were evaluated; those with significant influence on the surg...
DB2 data sharing offers many advantages in the right environment, and performs very well when DB2 is properly tuned. DB2 data sharing can significantly increase capacity, it offers increased availability, and it provides a flexible operating environment. In certain environments, DB2 data sharing can dramatically improve performance of DB2 subsystems (e.g., when most data are shared and most of ...
In order to deal with buffer overflow in ATM-based high-
Numerous security technologies which detect buffer overflow have already proposed. Almost these technologies detect if buffer overflows happen or not, but don’t detect alteration of variable integrity. But there are attacks which are not be able to be defenced unless the technology detect alteration of variable integrity. So in this paper, we propose a system which detect alteration of variable...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید