نتایج جستجو برای: tracing

تعداد نتایج: 28358  

2012
Muhammad Atif Syed Azhar Syed Sulaiman Asrul Akmal Shafie Irfhan Ali Muhammad Asif

Tuberculin skin testing (TST) and chest X-ray are the conventional methods used for tracing suspected tuberculosis (TB) patients. The purpose of the study was to calculate the cost incurred by Penang General Hospital on performing one contact tracing procedure using an activity based costing approach. Contact tracing records (including the demographic profile of contacts and outcome of the cont...

2000
Yingwei Cui Jennifer Widom

A data warehousing system collects data from multiple distributed sources and stores the integrated information as materialized views in a local data warehouse. Users then perform data analysis and mining on the warehouse views. Figure 1 shows the basic architecture of a data warehousing system. In many cases, the warehouse view contents alone are not su cient for in-depth analysis. It is often...

2013
Oliver Mohr Julia Hermes Susanne B Schink Mona Askar Daniel Menucci Corien Swaan Udo Goetsch Philip Monk Tim Eckmanns Gabriele Poggensee Gérard Krause

BACKGROUND Tracing persons who have been in contact with an infectious patient may be very effective in preventing the spread of communicable diseases. However, criteria to decide when to conduct contact tracing are not well established. We have investigated the available evidence for contact tracing with a focus on public ground transport aiming to give guidance in what situations contact trac...

2010
Khairul Salleh Mohamed Sahari Hiroaki Seki

Problem statement: Edge tracing is considered important for deformable object manipulation in order to spread and reveal the original shape of an object before it can be sorted. It is important in unfolding clothes to reveal its original state during sorting. Tracing in this study context involved tracing the clothes edge, with the robot arm movement based on feedback from sensors. Development ...

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2015
Bo Tang Jiapeng Zhang

Reducibility between different cryptographic primitives is a fundamental problem in modern cryptography. As one of the primitives, traitor tracing systems help content distributors recover the identities of users that collaborated in the pirate construction by tracing pirate decryption boxes. We present the first negative result on designing efficient traitor tracing systems via black-box const...

ژورنال: مواد پرانرژی 2016
نجفی, اصغر , تقیان نسب, ابوالفضل , جهانیان, احد , فردوسی, محمد , نایب حسینی, محمد رضا,

Propellants are decomposed slowly during storage. So each propellant has useful life time which more than that time propellant is not safe and cannot used. Tracing of propellant stabilizer consumption is one of the important methods for determination of storage life time period of a propellant. In this article by accelerated aging on a double-base propellant and then chemical extraction of stab...

2003
Emin Oztas

Received 2 January 2003; accepted 29 January 2003 ABSTRACT The tracing of neural pathways continues to be an important concern for neuroanatomy. During the second half of the nineteenth century, at a time when the foundations of neuroanatomy were being established, tracing pathways often required laborious dissections by hand. Then, neuroanatomy experienced a methodological revolution in the be...

Journal: :Cell 2012
Kai Kretzschmar Fiona M. Watt

Lineage tracing is the identification of all progeny of a single cell. Although its origins date back to developmental biology of invertebrates in the 19(th) century, lineage tracing is now an essential tool for studying stem cell properties in adult mammalian tissues. Lineage tracing provides a powerful means of understanding tissue development, homeostasis, and disease, especially when it is ...

1986
Gerard J. Holzmann

Tools for performing automated analyses of data communication protocols are frequently based on symbolic execution algorithms that search the behavior of finite state machine models. The symbolic execution algorithms, however, are inherently restricted in the size of the models that they can handle. They work well for models that generate up to 100,000 system states. Beyond that the time and sp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید