نتایج جستجو برای: in adequate details

تعداد نتایج: 16984920  

2011

Components of a software system may be related in a wide variety of ways. These relationships need to be represented in software architecture in order develop quality software. In practice, software architecture is immensely challenging, strikingly multifaceted, extravagantly domain based, perpetually changing, rarely cost-effective, and deceptively ambiguous. This paper analyses relations amon...

Journal: :Human Vaccines & Immunotherapeutics 2018

Background: The touch preparation technique is an accurate and rapid method, and when used as intraoperative consultation examination technique it preserves a good amount of tissue for paraffin embedded sections. This study aimed at examining the accuracy of the touch preparation technique by comparing its diagnosis with that of final pathological diagnosis made by microscopic examinations. ...

P. Mokhtary , S. M. Hosseini ,

In this paper we try to put different practical aspects of the general linear methods discussed in the papers [1,6,7] under one algorithm to show more details of its implementation. With a proposed initial step size strategy this algorithm shows a better performance in some problems. To illustrate the efficiency of the method we consider some standard test problems and report more useful detail...

Journal: :iranian journal of medical sciences 0
tahere mazoochi anatomical sciences research center, kashan university of medical sciences, kashan, iran tahere khamechian anatomical sciences research center, kashan university of medical sciences, kashan, iran javad alizargar anatomical sciences research center, kashan university of medical sciences, kashan, iran

background: the touch preparation technique is an accurate and rapid method, and when used as intraoperative consultation examination technique it preserves a good amount of tissue for paraffin embedded sections. this study aimed at examining the accuracy of the touch preparation technique by comparing its diagnosis with that of final pathological diagnosis made by microscopic examinations. met...

Journal: :Electronic Notes in Theoretical Computer Science 2002

2012
Gina M. B. Oliveira Luiz G. A. Martins Leonardo S. Alt

Cellular automata (CA) are particularly well suited for cryptographic application and there are several previous studies in this topic (Benkiniouar & Benmohamed, 2004; Gutowitz, 1995; Kari, 1992; Nandi et al., 1994; Oliveira et al., 2004; 2008; Seredynski et al., 2003; Tomassini & Perrenoud, 2000; Wuensche, 2008; Wolfram, 1986). Since CA rule is simple, local and discrete, it can be executed in...

Journal: :The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید