Genome use for computer
نویسندگان
چکیده
منابع مشابه
Cooperative Computer System For Genome Sequence Analysis
Analysis of the huge volumes of data generated by large scale sequencing projects clearly requires the construction of new sophisticated computer systems. These systems should be able to handle the biological data as well as the results of the analysis of this data. They should also help the user to choose the most appropriate method for a simple task and to string together the methods needed t...
متن کاملthe use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach
abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...
15 صفحه اولDocumenting Use Cases For Computer Generated Actors
In this paper, we discuss a solution to the problem of improving the design and documentation of computer-generated actor (CGA) systems by exploiting the Unified Modeling Language (UML) to document CGA requirements and uses. The paper contains a brief introduction to the UML and includes a description of its diagrams and documentation capabilities. We describe how the UML has been used to compl...
متن کاملMusculoskeletal complaints associated with computer use and its ergonomic risks for office workers of a medical sciences university in Tehran
Purpose: To determine the musculoskeletal complaints associated with using computer and its ergonomic risks for office workers of a medical sciences university in Tehran. Materials and Methods: In this cross-sectional study, a background questionnaire was used to determine individuals and computer use habits’ characteristics. A total number of 164 office workers of AJA University of M...
متن کاملConsenting to Computer Use
The federal Computer Fraud and Abuse Act ("CFAA ") makes it a crime to "access[] a computer without authorization or exceed[] authorized access." Courts and commentators have struggled to explain what types of conduct by a computer user are "without authorization." But this approach is backwards; authorization is not so much a question of what a computer user does, as it is a question of what a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1990
ISSN: 0028-0836,1476-4687
DOI: 10.1038/345466b0