• No results found

recovery techniques

Evaluation of low trace DNA recovery techniques from ridged surfaces

Evaluation of low trace DNA recovery techniques from ridged surfaces

... 6 recovery techniques evaluated the use of tape lifts appear to be most appropriate for the recovery of low trace DNA from ridged ...other techniques were not significantly different, ...

9

Effect of Oocyte Recovery Techniques on in Vitro Production of Swine Embryos

Effect of Oocyte Recovery Techniques on in Vitro Production of Swine Embryos

... It has been shown that follicular aspiration is also less efficient when compared to whole ovary slicing. Wang et al., (2007) compared goat oocytes obtained from chopped ovaries, punctured follicles and aspirated ...

7

STI Friendly Clock Recovery Techniques for Bit Banged Communication Protocols

STI Friendly Clock Recovery Techniques for Bit Banged Communication Protocols

... existing techniques in hardware and software and compares a few proposed clock recovery techniques which can be used for software protocol implementations using ...

41

A Study on Recovery Techniques in Cyber Forensics using Data Mining Approach

A Study on Recovery Techniques in Cyber Forensics using Data Mining Approach

... various recovery techniques, and their significance in different situations from those attempts, which destroy files or inflict physical damage to the ...

7

Performance Analysis of STAP Algorithms Based on Fast Sparse Recovery Techniques

Performance Analysis of STAP Algorithms Based on Fast Sparse Recovery Techniques

... sparse recovery techniques [6– 10], where the whole procedure can be divided into the following steps: Step 1: Estimate the clutter angle-Doppler profiles from snapshots x l , l = 1, 2, ...

18

REVIEW ON CONDENSATE HEAT RECOVERY TECHNIQUES IN STEAM DISTRIBUTION SYSTEM

REVIEW ON CONDENSATE HEAT RECOVERY TECHNIQUES IN STEAM DISTRIBUTION SYSTEM

... heat recovery is an important technique to recover heat from condensate steam distribution ...utilization/ recovery that waste heat necessary by adopting a new technique such as heat pump for industrial ...

8

Efficient Data Recovery Techniques ON Mlc Nand Flash Memory

Efficient Data Recovery Techniques ON Mlc Nand Flash Memory

... the recovery time, the FTL may be lower than the read operations from blocks and store the invalid page of the block called physical block number ...the recovery process of this ...

6

Characterization of myocardial T1 mapping bias caused by intramyocardial fat in inversion recovery and saturation recovery techniques

Characterization of myocardial T1 mapping bias caused by intramyocardial fat in inversion recovery and saturation recovery techniques

... In cases such as tissue boundaries between the myo- cardium and blood, border voxels containing a partial volume of each will produce a T1 estimate that is an intermediate value between the myocardium and blood in ...

11

REVIEW ON WASTE HEAT RECOVERY TECHNIQUES FOR VARIOUS APPLICATIONS

REVIEW ON WASTE HEAT RECOVERY TECHNIQUES FOR VARIOUS APPLICATIONS

... Researchers focuses on HPHX(heat pipe heat exchanger) for heat recovery in air conditioning system. This use of HPHX in clean room air conditioning there is considerable saving in energy. By implementing ...

7

Efficient Deduplication with Security Using Jenkins and Recovery Techniques

Efficient Deduplication with Security Using Jenkins and Recovery Techniques

... These represent the enhancement of proposed system in security. Jenkins has function techniques has been proposed to enforce data confidentiality while making deduplication feasible. . It encrypts/decrypts a data ...

7

Vol 1, No 3 (2014)

Vol 1, No 3 (2014)

... Research into manufacturing combined technology is the new approach to overcome many of the limitations of a single imaging technique. one of the techniques is to combine pet and CMR. whilst CMR defines the ...

5

How to Design and Test Safety Critical Software System

How to Design and Test Safety Critical Software System

... Formal method based approach is the first approach which is used to formally prove that the system that is being designed does not contain any construction errors by the help of formal methods. Formal methods are ...

7

Simulation study of improving oil recovery by polymer flooding in a Malaysian reservoir

Simulation study of improving oil recovery by polymer flooding in a Malaysian reservoir

... oil recovery methods with use of secondary recovery methods and tertiary recovery methods which will improve oil ...conventional recovery method used after primary recovery which is a ...

24

STUDIES ON INFLUENZA IN THE PANDEMIC OF 1957 1958  III  ISOLATION OF INFLUENZA A (ASIAN STRAIN) VIRUSES FROM INFLUENZA PATIENTS WITH PULMONARY COMPLICATIONS  DETAILS OF VIRUS ISOLATION AND CHARACTERIZATION OF ISOLATES, WITH QUANTITATIVE COMPARISON OF ISOL

STUDIES ON INFLUENZA IN THE PANDEMIC OF 1957 1958 III ISOLATION OF INFLUENZA A (ASIAN STRAIN) VIRUSES FROM INFLUENZA PATIENTS WITH PULMONARY COMPLICATIONS DETAILS OF VIRUS ISOLATION AND CHARACTERIZATION OF ISOLATES, WITH QUANTITATIVE COMPARISON OF ISOLATION METHODS

... Recovery of virus from patients with pulmonary complications By the use of the amniotic or allantoic inoculation techniques which have been described, hemagglutinating viruses were recov[r] ...

10

Recovery networks and community connections: identifying connection needs and community linkage opportunities in early recovery populations

Recovery networks and community connections: identifying connection needs and community linkage opportunities in early recovery populations

... of techniques for assertively linking people to attend mutual aid meetings (in this case, Alcoholics Anonymous, Narcotics Anonymous or Cocaine Anonymous) in a residential treatment ...

22

Resilience in high level parallel programming languages

Resilience in high level parallel programming languages

... Driven by the increasing demand for a standard fault tolerant specification for MPI, the MPI Fault Tolerance Working Group (FTWG) was formed to meet this objective. The FTWG studied two proposals: Run Through ...

259

Generic Lossless Visible Watermarking: A Review

Generic Lossless Visible Watermarking: A Review

... several techniques about digital watermarking(visible as well as invisible) and also a new approach of lossless reversible watermarking techniques with strong security is ...watermarking techniques ...

7

Techniques for Visibility Recovery

Techniques for Visibility Recovery

... Fog removal also known as visibility restoration refers to different methods that aim to reduce or remove the degradation that have occurred while the digital image was being obtained. The degradation may be due to ...

5

Infrastructure as a Service Based Data Transfer in Cloud Server during Disaster

Infrastructure as a Service Based Data Transfer in Cloud Server during Disaster

... disaster recovery analysis. Disaster recovery analysis refers to the use of recovering the data during ...Disaster recovery, Wireless sensor network, Replication, and ...Disaster recovery is a ...

7

Evaluation of a Novel Mononuclear Cell Isolation Procedure for Serological HLA Typing

Evaluation of a Novel Mononuclear Cell Isolation Procedure for Serological HLA Typing

... the recovery, purity, and viability of the PBMC after several periods of ...the recovery of PBMC was significantly higher than recovery with the standard technique (P < ...

6

Show all 10000 documents...

Related subjects