نتایج جستجو برای: automatic implementation

تعداد نتایج: 494637  

2002
Angelo Corsaro Douglas C. Schmidt

Over 90 percent of all microprocessors are now used for realtime and embedded applications. Since the behavior of these applications is often constrained by the physical world, it is important to devise higher-level programming languages and middleware that robustly and productively enforce real-time constraints, as well as meeting conventional functional requirements. This paper provides two c...

2017
Gillian Harvey Elizabeth Lynch

Facilitating the implementation of continuous quality improvement (CQI) is a complex undertaking. Numerous contextual factors at a local, organizational, and health system level can influence the trajectory and ultimate success of an improvement program. Some of these contextual factors are amenable to modification, others less so. As part of planning and implementing healthcare improvement, it...

Purpose: The aim of the current study was to investigate the effectiveness of schema therapy and mindfulness based cognitive therapy on the rate of using negative automatic thoughts in women with major depression in Mashhad. Participants were 36 depressed women clients, randomly selected and randomly designated to 3 groups (two experimental group and control group). Materials and method: This s...

دژکام, رسول , شاهمیری, امیرشهاب , صفابخش, رضا صفابخش,

Automatic correction of typos in the typed texts is one of the goals of research in artificial intelligence, data mining and natural language processing. Most of the existing methods are based on searching in dictionaries and determining the similarity of the dictionary entries and the given word. This paper presents the design, implementation, and evaluation of a Farsi typo correction system u...

In this paper, the theoretical foundation, the way of implementation and the uses of Pars Morph, a Persian morphological analyzer is introduced. Pars Morph is a rule-based Persian morphological analysis system, which analyzes the internal structure of word in Persian and determines the grammatical category and function of the word parts. Pars Morph being in link with a lexicon covering about 45...

Journal: :journal of biomedical physics and engineering 0
m s golvardi yazdi instructor department of anaesthesiology, critical care and pain management research center, hormozgan university of medical sciences, bandar abbas, iran m naderizadeh ergonomy msc student, the university of social welfare and rehabilitaion sciences, tehran, iran r afzalipour medical physics department, school of medicine, iran university of medical sciences, tehran, iran h a abedi assistant professor phd of human physiology, faculty of medicine jahrom university of medical, science research center for non communicable diseases, jahrom , iran m radmehr department of anesthesiology, jahrom university of medical sciences, jahrom, iran r golvardi yazdi dental student, department of dentistry, shahid sadoughi university of medical sciences, yazd, iran

800x600   introduction:  many items are needed for dressing including sterile dressing set, antiseptic and washing solutions, leucoplast tape, waste bin for infectious garbage, waste bin for noninfectious garbage, safe disposal trash for sharp cutting instruments, bedpan and sometimes drugs. all the items are laid out on a simple wheeled trolley. the multiplicity of items together with problems...

2014
Seo Jin Park

In a distributed system, like RAMCloud, supporting automatic retry of RPC, it is tricky to achieve linearizability correct along with durability and liveness. Automatic retry may cause duplicate executions when a server fails after durably recording the original execution and before sending its response. We can cope with the problem by implementing at-most-once mechanism for RPC system. But in ...

2000
Sigrid Gürgens René Peralta

We present a method for validating cryptographic protocols. The method can find flaws which are inherent i~l the design of the protocol as well as flaws arising from the particular implementation of the protocol. The latter possibility arises from the fact that there is no universally accepted standard for describing either the cryptographic protocols themselves or their implementation. Thus, s...

2003
W. Greg Phillips T. C. Nicholas Graham

We present a new architectural style for synchronous groupware that eases the transition from scenario based modeling to component design, and from component design to distributed implementation. The style allows developers to work at a distribution-independent conceptual level and provides for automatic or semi-automatic refinement of conceptual designs into appropriate distributed implementat...

1998
Sigrid Gürgens René Peralta

We present a search method for detecting potential security aws in cryptographic protocols. The method can nd aws which are inherent in the design of the protocol as well as aws arising from the particular implementation of the protocol. The latter possibility arises from the fact that there is no universally accepted standard for describing either the cryptographic protocols themselves or thei...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید