نتایج جستجو برای: three solution methods ie

تعداد نتایج: 3221993  

Journal: :Journal of Ambient Intelligence and Smart Environments 2019

اسکویی, مهوش, ایمانی فولادی, عباسعلی, دادفرما, نرگس, فرخ, پریسا ,

Introduction & Objective: Enterococci have emerged as the leading nosocomial pathogens. In addition to natural resistance to many agents, enterococci have also developed plasmid- and transposon-mediated resistance to high concentrations of aminoglycosides. High-level gentamicin resistance (HLGR) of enterococci results in the failure of drug synergism with an aminoglycoside plus cell-wall-acti...

1993
Michael Thielscher

A solution to the problem of speciicity in a resource{oriented deductive approach to actions and change is presented. Speciicity originates in the problem of overloading methods in object oriented frameworks but can be observed in general applications of actions and change in logic. We give a uniform solution to the problem of speciicity culminating in a completed equational logic program with ...

1993
Steffen Hölldobler Michael Thielscher

A solution to the problem of specificity in a resource–oriented deductive approach to actions and change is presented. Specificity originates in the problem of overloading methods in object oriented frameworks but can be observed in general applications of actions and change in logic. We give a uniform solution to the problem of specificity culminating in a completed equational logic program wi...

Journal: :Nucleic acids research 1991
R D Everett A Orr M Elliott

Herpes simplex virus type 1 (HSV-1) encodes five immediate early (IE) polypeptides. This paper reports the construction of a baculovirus vector which expresses large amounts of Vmw110, the product of IE gene 1. The expressed protein has been purified to near homogeneity and has a mobility on SDS polyacrylamide gels identical to that of Vmw110 produced during HSV-1 infection. Characterisation of...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

2014
ABDELRAHMAN ABUARQOUB

Recent advances in the development of microprocessors, microsensors, ad-hoc wireless networking and information fusion algorithms led to increasingly capable Wireless Sensor Networks (WSNs). Besides severe resource constraints, sensor nodes mobility is considered a fundamental characteristic of WSNs. Information Extraction (IE) is a key research area within WSNs that has been characterised in a...

Journal: :European heart journal 2011
Carianne L Verheugt Cuno S P M Uiterwaal Enno T van der Velde Folkert J Meijboom Petronella G Pieper Gerrit Veen Jan L M Stappers Diederick E Grobbee Barbara J M Mulder

AIMS The risk of infective endocarditis (IE) in adults with congenital heart disease is known to be increased, yet empirical risk estimates are lacking. We sought to predict the occurrence of IE in patients with congenital heart disease at the transition from childhood into adulthood. METHODS AND RESULTS We identified patients from the CONCOR national registry for adults with congenital heart...

دکتر علی بیکمرادی, , دکتر قدرت الله روشنایی, , دکتر مهناز خطیبان, , صبور حسینی, ,

Introduction & Objective: It is important to identify the rate of burnout among emergency services staff because they are the first people who attend the emergency situations. This study was done to determine the operational staffs’ burnout in the Medical Emergency Services in Hamadan. Materials & Methods: In this cross - sectional study, all 110 operational staff of the Emergency Medical Se...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید