نتایج جستجو برای: distribute generation
تعداد نتایج: 367221 فیلتر نتایج به سال:
General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of pri...
We study sharp peak landscapes (SPL) of Eigen model from a new perspective about how the quasispecies distribute in the sequence space. To analyze the distribution more carefully, we bring forth two tools. One tool is the variance of Hamming distance of the sequences at a given generation. It not only offers us a different avenue for accurately locating the error threshold and illustrates how t...
Distributing content on the Internet is an important economic, educational, social, and cultural endeavor. To this end, there have been proposals to use traditional server-based content distribution networks (CDNs) to replicate and distribute web and multimedia content of big content producers, such as news websites, or big businesses, such as online shopping websites, etc., to millions of Inte...
OBJECTIVE To assess the breast cancer knowledge level of Saudi female school students. METHODS A detailed questionnaire on cancer breast was designed with all the needed information. Using a map of the Jeddah area of Saudi Arabia, schools were identified in each area and permission was sought from the Ministry of Education to distribute the questionnaire to the students. A team of volunteers ...
Khrapchenko’s classical lower bound n on the formula size of the parity function f can be interpreted as designing a suitable measure of subrectangles of the combinatorial rectangle f−1(0)× f−1(1). Trying to generalize this approach we arrived at the concept of convex measures. We prove the negative result that convex measures are bounded by O(n) and show that several measures considered for pr...
This paper shows how to distribute GPS-time with s-accuracy and below even in Ethernet-based distributed systems. Our SynUTC-approach 1 is based upon a simple network controller-level hardware for timestamping data packets as they leave and arrive at a node, which comes in two avours: The memory-based timestamping method exploited by our Network Time Interface (NTI) M-Module timestamps data pac...
One of the many bizarre features of entanglement is that Alice, by sending a qubit to Bob in a separable state, can generate some entanglement between herself and Bob. This protocol is stripped down to the bare essentials to better elucidate the key properties of the initial resource state that enable this entanglement distribution. The necessary and sufficient conditions under which the correl...
In this paper we point out the reasons that lead us to distribute modular applications and how we distribute them. We illustrate our ideas with an example of expert system shell.
Security of networks depends on reliable key management systems which generate and distribute symmetrical/asymmetrical encryption/decryption keys between communicating parties. Traditionally, in wired networks, a central server is responsible to generate and distribute the keys securely. But because of no central server or fixed infrastructure exists in mobile ad hoc networks, there are many di...
In this paper, the structure of Nigerian power sector is examined, problems in are identified and a new proposed for effective generation, transmission distribution. Besides usually canvassed, current defective from perspective ownership infrastructures, passive involvement state governments undue influence federal government. The reforms were driven by Electric Power Sector Reform Act (EPSRA) ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید