• No results found

15 cm/s

Performance characteristics of silicon photomultiplier based 15-cm AFOV TOF PET/CT

Performance characteristics of silicon photomultiplier based 15-cm AFOV TOF PET/CT

... In this article, we evaluated the system performance of the Discovery Meaningful Insights PET/CT with a 3-ring PET (Discovery MI 3, GE Healthcare, Milwaukee, WI, USA) and compared it with literature data on the similar ...

17

Farmers’ preferred trees carbon sequestration capacity in Lake Victoria’s rural landscapes.

Farmers’ preferred trees carbon sequestration capacity in Lake Victoria’s rural landscapes.

... 0-15 cm soil depth. For soil depth of 15-30 cm, maize had higher carbon stock compared to all other land-use beneath Ficus nantalensis ...0-15 cm topsoil compared to other ...

11

Numerical Investigation for Wind Turbine Blade For Higher Reynolds Number For Darrieus Rotor

Numerical Investigation for Wind Turbine Blade For Higher Reynolds Number For Darrieus Rotor

... 5 cm, 10 cm , 15 cm for NACA0015, and it is observed that as Reynolds number increases lift coefficient increases with respect to increase in angle of attack, It is also observed that for same ...

8

Method Development And Validation of Sultamcillin Tosylate in Tablet Dosage form by RP-HPLC and HPTLC

Method Development And Validation of Sultamcillin Tosylate in Tablet Dosage form by RP-HPLC and HPTLC

... Table-3 Main difference of HPTLC and TLC 14 PARAMETER HPTLC TLC Layer of Sorbent 100µm 250µm Efficiency Separations High due to smaller particle size generated 3 - 5 cm Less 10 - 15 cm S[r] ...

163

Effect of Moisture Conservation Methods and Plant Density on the Productivity of Two Maize (Zea mays L ) Varieties under Semi Arid Tropics of Hamelmalo, Eritrea

Effect of Moisture Conservation Methods and Plant Density on the Productivity of Two Maize (Zea mays L ) Varieties under Semi Arid Tropics of Hamelmalo, Eritrea

... The results of the experiment indicated that among all the combinations, 04sadve hybrid variety sown at 75 cm × 25 cm spacing in ridge and furrow method or at 75 cm × 15 cm spacing in ti[r] ...

13

Phytoremediation methodology of metals contaminated surface soil by Tagetes Erecta

Phytoremediation methodology of metals contaminated surface soil by Tagetes Erecta

... Figure 8.2: Percentage % of overall elements in the compartment of Tegetes erecta in the differences of sampling and the controlling in the layer of 5 cm, 10 cm and 15 cm depth The Lead [r] ...

11

Minimum viewing angle for visually guided ground speed control in bumblebees

Minimum viewing angle for visually guided ground speed control in bumblebees

... the 15 to 30cm tunnel and 30deg. in the 30 to 15cm ...the 15 to 30cm tunnel, 24deg. in the 30 to 15cm tunnel and ...

8

CM-5CStarUsersGuide.pdf

CM-5CStarUsersGuide.pdf

... The C* compiler and the CM-5 linker, cmld (or Id if you specify the -cmsim option), generate a single output file that combines a scalar executable program for the partition mana[r] ...

84

CM-5IOSystemProgrammingGuide.pdf

CM-5IOSystemProgrammingGuide.pdf

... * When performing serial 1V, the program can use the CM Fortran Utility Library, the CMFS library, and, if the file system is NFS-mounted, UNIX routines... To access a standard implemen[r] ...

166

CM-5CStarReleaseNotes.pdf

CM-5CStarReleaseNotes.pdf

... A functional interface has been added that gives you access to the memory address and stride for a pointer to parallel variable, and lets you create pointers to parallel var[r] ...

9

CM-5CStarPerformanceGuide.pdf

CM-5CStarPerformanceGuide.pdf

... In general, a PN code block may perform computation for several statements or even a fraction of a statement. The compiler merges parallel computation into a single PN code block only wh[r] ...

91

CM-5SoftwareSummary.pdf

CM-5SoftwareSummary.pdf

... As suggested above, the Connection Machine CM-5 provides software to support both data parallel and message-passing programs.. Figure 1 diagrams the current CM-5 software offerings.[r] ...

33

CM-5ActiveMessageLayer.pdf

CM-5ActiveMessageLayer.pdf

... The pong function is invoked by CMAM on the remote node with the return node and flag address as arguments. It simply invokes poof on the requesting processor using [r] ...

53

A user-orientated column modelling framework for efficient analyses of the Martian atmosphere

A user-orientated column modelling framework for efficient analyses of the Martian atmosphere

... Figure 3. Viking Lander 1 site temperatures observed by the Mars climate sounder together with temperatures from the column model. Five MCS soundings are plotted in each figure. The profile locations range from latitudes ...

13

Mechanical and Machining Properties Analysis of Al6061 Cu Reinforced SiCP Metal Matrix Composite

Mechanical and Machining Properties Analysis of Al6061 Cu Reinforced SiCP Metal Matrix Composite

... 1.5 cm/s, 2.0 cm/s, 2.5 cm/s, 3.0 cm/s and ...3.5 cm/s two levels of material type (Al6061 + 4% Cu alloy and Al + 4% Cu, reinforced 5% SiC p MMC) and ...

7

CM-5UsersGuide.pdf

CM-5UsersGuide.pdf

... Message-passing programs take a node-level view of the system. Again, a single program executes; but in this programming style, a separate copy of the program executes independe[r] ...

89

CM-AVSReleaseNotes.pdf

CM-AVSReleaseNotes.pdf

... The CM/AVS software package includes libraries of modules, a set of routines that provide general operations for parallel fields, some on-line code examples, the help files, and [r] ...

12

CM-AVSUsersGuide.pdf

CM-AVSUsersGuide.pdf

... Most modules process typed data input(s) into typed data output(s). Each module performs a given function. The function may be as simple as adding two arrays, or as c[r] ...

119

Preparation and characterization of the adducts of bis(piperidinedithiocarbamato)nickel(II) with substituted pyridines

Preparation and characterization of the adducts of bis(piperidinedithiocarbamato)nickel(II) with substituted pyridines

... The appearance of these three broad bands along with shoulders show that the adducts formed have trans distorted octahedral geometry around Ni(II) metal ion. In addition to these low intensity bands, M → L charge ...

6

Optimal  First-Order  Masking  with  Linear   and  Non-Linear  Bijections

Optimal First-Order Masking with Linear and Non-Linear Bijections

... Hardware implementations of block-oriented cryptographic functions are vulner- able to side-channel attacks. Yet their lack of algebraic structure makes them hard to protect efficiently. Boolean masking is one answer to ...

29

Show all 10000 documents...

Related subjects