K/T

Top PDF K/T:

Acceleration of tissue phase mapping by k t BLAST: a detailed analysis of the influence of k t BLAST for the quantification of myocardial motion at 3T

Acceleration of tissue phase mapping by k t BLAST: a detailed analysis of the influence of k t BLAST for the quantification of myocardial motion at 3T

CRT: Cardiac Resynchronization Therapy; DANTE: Delay alternating with nutation for tailored excitation; DENSE: Displacement encoding with stimulated echoes; FOV: Field-of-View; GRAPPA: Generalized autocalibrating partially parallel acquisitions; HARP: Harmonic phase approach; nRMSD: Normalized root mean square deviation; PF: Peak factor; R: k-t Blast acceleration factor; SAR: Specific absorption rate; SENC: Strain-encoding; SENSE: Sensitivity encoding; TPM: Tissue Phase Mapping; UNFOLD: Unaliasing by Fourier-encoding the overlaps using temporal dimension

8 Read more

Preserving Privacy of Data Using K Anonymisation and T Closeness

Preserving Privacy of Data Using K Anonymisation and T Closeness

vulnerable to the attacks from the external sources. The published dataset must have no information loss and should possess high utility gain for which utility factors are introduced for K-anonymity. For the research purpose 2 datasets are taken into consideration Adult dataset and Medical dataset. The adult dataset is taken from UCI repository which has 815 instances. K anonymity is performed on 5 quasi identifiers and 2 sensitive attributes. The sensitive attributes are relationship and occupation. The quasi identifiers are taken to be education number, education, work class, hours/week and marital status. The medical dataset contains comparatively lesser instances than the adult dataset. The medical data set is collected from true patient details in order to work with original datasets to understand the utility differences. The K-anonymity is done with bucket size to be 6. The medical data set is collected from true patient details in order to work with original datsets to understand the utility differences. The K-anonymity is done with bucket size to be 6. K-anonymity prevents linkage attacks but does not prevent attribute disclosure. In order to achieve higher levels of privacy different techniques are used such as ℓ-diversity and T- closeness.
Show more

6 Read more

Effect of Malnutrition on K+ Current in T Lymphocytes

Effect of Malnutrition on K+ Current in T Lymphocytes

activation of the K ⫹ current presents a slower temporary course. Therefore, voltage-clamp pulses of 2,000 ms are ap- plied for obtaining the K ⫹ current in the steady state. The outward current is fundamentally of K ⫹ . In Fig. 1b, the out- ward current is negligible when Cs ⫹ replaces the K ⫹ in the solutions of the pipette and the bath. The K ⫹ current that was obtained is similar to the one caused by the opening of type n ⬘ channels (13, 14), as can also be inferred by a lack of cumula- FIG. 3. Mean of the magnitudes of the potassium currents for each membrane potential in T lymphocytes of animals with severe malnutrition. In panel a, K ⫹ current for different membrane potentials, the bars on the left (C) were obtained from T lymphocytes of the control group (n ⫽ 12), and those on the right (SM) correspond to T lymphocytes of rats with severe malnutrition (n ⫽ 9). In panel b, the K ⫹ current was normalized with respect to the maximal current (Im/Imax) that was obtained with a ⫹ 60-mV membrane potential pulse. The asterisks (* and **) indicate P values of ⬍ 0.005 and ⬍ 0.001, respectively.
Show more

6 Read more

Search for CP violation using T odd correlations in D 0 → K + K −π+π− decays

Search for CP violation using T odd correlations in D 0 → K + K −π+π− decays

higher momentum is used to calculate the triple product. Since this is a Cabibbo-favoured decay, the CP -violating effects are assumed to be negligible, and any significant deviation from zero is considered as a bias introduced by the experimental technique and the detector reconstruction. The asymmetry obtained on the control sample is compatible with no bias, a T CP -odd (D 0 → K − π + π − π + ) = (0.05 ± 0.04)%. A systematic uncertainty equal to the statistical uncertainty of this measurement is assigned. The test was repeated for different regions of phase space with consistent results.
Show more

22 Read more

K. T.

K. T.

3 Major guidelines for IYCF practices are initiation of breast feeding within half to one hour of delivery, exclusive breast feeding for the first six months of life,[r]

6 Read more

On a class of linear ordinary differential equations having ∑k=0∞xkδ(k)(t) and ∑k=0mxkδ(k)(t) as solutions

On a class of linear ordinary differential equations having ∑k=0∞xkδ(k)(t) and ∑k=0mxkδ(k)(t) as solutions

We introduced some linear homogeneous ordinary differential equations which have both formal and finite distributional solutions at the same time, where the finite solution is a partial [r]

8 Read more

PW CVolume of the Heat of water (kJ/kg C) T Temperature of liquid steel (K) T Temperature of cooling water (K) t Melting time (sec) R Heat resistance of the furnace lining (kW/K)

PW CVolume of the Heat of water (kJ/kg C) T Temperature of liquid steel (K) T Temperature of cooling water (K) t Melting time (sec) R Heat resistance of the furnace lining (kW/K)

Several variables related to the equation and that can be measured consist of the electricity power put into the furnace, the temperature of liquid steel in the furnace, the temperature of input and output cooling water, flow rate of cooling water, and mass of steel to find the heat model of the furnace system designed. We attempt to get the variables from the heat incurred in the furnace so we can measure and the estimated temperature is closet to the temperature in the actual furnace as much as possible. We have found that the heat given to the steel in the process of measuring the liquid steel temperature is the processes that the steel in the furnace becomes the liquid so there is no latent heat. We have found only the heat that increases the temperature. Hence, we can cut this part of heat from the study. We have also found that the heat that increases the temperature is the function of the liquid steel temperature in the furnace f ( Δ T S ) . Upon considering the heat loss in the converter, we have found that it is the function of the resistance and flow. Both the resistance and flow depend on the electricity power input. Thus, we can summarize that the heat loss in the converter is the function of electricity power input f ( P in ) regarding the heat loss in the cooling system. This part of heat is the heat used for transferring the heat to the coil system of the furnace, which is the function of the flow rate of the heat induction, namely, the heat from liquid steel in the furnace that passing out of the furnace wall, which is the function of the liquid steel temperature in the furnace f ( Δ T S ) and other heat losses and we also assume them to be constant so when replacing the variables measured with the variables that are functions of the heat equation, we also get the following equation.
Show more

5 Read more

Operating Instructions Kahr K, T, P & PM Series

Operating Instructions Kahr K, T, P & PM Series

After making absolutely sure that the magazine is removed and the chamber is empty, point the pistol in a safe direction and pull the trigger to release tension on the Striker... Always [r]

20 Read more

Spatial variation of woolly apple aphid (Eriosoma lanigerum, Hausmann) in a genetically diverse apple planting

Spatial variation of woolly apple aphid (Eriosoma lanigerum, Hausmann) in a genetically diverse apple planting

Ripley’s K(t) function, estimated using the raw data of all 2136 trees, fell within the confidence interval for distances beyond about 25m (Fig. 2a). However, for distances less than this the estimated function was greater than the upper limit; i.e. there were more heavily infested trees within 20-25 m of a heavily infested tree than would be expected if the distribution were random. The computations were repeated, this time without row 11 and omitting trees at the end of the row (>200), thereby removing much of the observed large scale spatial pattern (Fig. 1). Ripley’s K(t) function was then found to be within the confidence limits for distances over about 8m (Fig. 2b). However, there was strong evidence of clumping at distances less than this.
Show more

6 Read more

Risk constrained trading strategies for stochastic generation with a single-price balancing market

Risk constrained trading strategies for stochastic generation with a single-price balancing market

Nomenclature Rt+k Tt+k xˆ t+k|t E {·} EtC+k Et+k dt+k d¯ Emax πtC+k πtS+k πt++k πt−+k NIVt+k φt+k Φ qα ν, η, α0 Revenue from settlement period t + k Imbalance cost in settlement period t[r]

17 Read more

9.	T. Kavitha, J. K. Arjun, B. Aneesh and K. Harikrishnan

9. T. Kavitha, J. K. Arjun, B. Aneesh and K. Harikrishnan

The soil samples were collected from the paddy fields in Kuttanad wetland, transported to the laboratory at 4°C and stored at -20°C. The metagenomic DNA from the soil samples was isolated with Nucleospin soil DNA isolation kit (Macherey Nagel, USA). The purity of the extracted DNA was checked with Nanodrop 1000 spectrophoto- meter (Thermo scientific, USA) and stored at -20 ο C. The 16S rRNA gene of archaea and bacteria were amplified from the metagenomic DNA using universal primers (Achenbach and Woese, 1995; Polz et al., 1999). The amplicons were checked by agarose gel electrophoresis and purified using gel band purification kit (GE Healthcare, UK). These products were then ligated into a T/A cloning vector and transformed into chemically competent cells of Escherichia coli JM 109. Positive clones were screened by colony PCR using vector specific primers. The 16S rRNA genes of positive clones were digested with the restriction enzyme Csp61 (Fermentas) and checked by agarose gel electrophoresis. Based on the digestion pattern observed in the Restriction Fragment Length Polymorphism (RFLP) analysis, the clones were grouped and one clone from each group was sequenced using the ABI PRISM Big Dye Terminator Cycle Sequencing kit v. 3.1 and ABI model 3100 automated sequencer (Applied Biosystems, USA).
Show more

6 Read more

Computing the chromatic number of t-(v,k,[lambda]) designs

Computing the chromatic number of t-(v,k,[lambda]) designs

to number This work for result index After of Steiner triple investigating designs sys and chromatic number of a specific sixteen non-isomorphic then and The on COLOUR for designs, secon[r]

41 Read more

Jurilinguistic Engineering in Cantonese Chinese: An N gram based Speech to Text Transcription System

Jurilinguistic Engineering in Cantonese Chinese: An N gram based Speech to Text Transcription System

Microsoft Word COLING project note doc Jurilinguistic Engineering in Cantonese Chinese An N gram based Speech to Text Transcription System B K T?sou, K K Sin, S W K Chan, T B Y Lai, C Lun, K T Ko, G K[.]

5 Read more

Text
A B S T R A K pdf

Text A B S T R A K pdf

Data Flow Diagram adalah suatu model logika data atau proses yang dibuat untuk menggambarkan dari tempat asal data dan tempat tujuan data yang keluar dari sistem, di tempat data disimpan[r]

30 Read more

Text
A B S T R A K pdf

Text A B S T R A K pdf

Dalam penelitian ini akan mengangkat tema tentang Sistem Informasi Pendataan Mahasiswa Fakultas Matematika dan Ilmu Pengetahuan Alam untuk pendataan mahasiswa maupun dosen serta memberik[r]

24 Read more

Text
A B S T R A K pdf

Text A B S T R A K pdf

Kegunaan Praktis : 1 Penelitian ini diharapkan dapat bermanfaat dan digunakan sebagai masukan bagi Pemerintah Daerah Kabupaten Tulang Bawang dalam memberikan perlindungan hukum dalam ben[r]

18 Read more

Text
A B S T R A K pdf

Text A B S T R A K pdf

Sebagai salah satu rezim dari TRIPs, IG diatur berdasarkan tujuan utama TRIPs untuk mempromosikan perlindungan yang efektif dan memadai bagai HKI, dan untuk meyakinkan tiap anggota TRIPs[r]

27 Read more

Potential targets of transforming growth factor-beta1 during inhibition of oocyte maturation in zebrafish

Potential targets of transforming growth factor-beta1 during inhibition of oocyte maturation in zebrafish

Inoue K, Nakamura K, Abe K, Hirakawa T, Tsuchiya M, Matsuda H, Miyamoto K, Minegishi T: Effect of transforming growth factor beta on the expression of luteinizing hormone receptor in cul[r]

11 Read more

Modeling Multi Echelon Multi Supplier Repairable Inventory Systems with Backorders

Modeling Multi Echelon Multi Supplier Repairable Inventory Systems with Backorders

Rt k: the required number of good items on day t in base k Ft k: the entering flow of failed items on day t in base k n: shipping time at the in pipeline m: shipping time at the out pipe[r]

9 Read more

The Impact of Adaptation Delays on Routing Protocols forMobile Ad-Hoc Networks (MANETs)

The Impact of Adaptation Delays on Routing Protocols forMobile Ad-Hoc Networks (MANETs)

Abbreviations and Definitions ξout k The average of ξout k ξin k Delay in realizing in-contact over k hops path; it is given by ψin − ϕin T T ξout k − ϕout Delay in realizing out-of-cont[r]

223 Read more

Show all 10000 documents...