نتایج جستجو برای: before discovering computer
تعداد نتایج: 1040667 فیلتر نتایج به سال:
Bidirectional transformations (bx) are mathematics-based formalisms used in applied computer science for maintaining the consistency of two (or more) related data structures [4]. Researchers from many different areas including software engineering (SE), programming languages (PL), databases (DB), and graph transformation (GT) are actively investigating the use of bx to solve a diverse set of pr...
We consider the problem of discovering partially periodic temporal associations, which we call p-patterns. In computer networks, a p-pattern might consist of ve repetitions every 30 seconds of a port-down event followed by a port-up event, which in turn is followed by a random gap until the next ve repetitions of these events. Finding p-patterns consists of two sub-tasks: (1) nding period lengt...
background: protein-protein interactions do not provide any direct information regarding the domains within the proteins that mediate the interactions. the majority of proteins are multi domain proteins and the interaction between them is often defined by the pairs of their domains. most of the former studies focus only on interacting domain pairs. however they do not consider the interaction...
Introduction: Due to development of educational systems and importance of education in the nursing profession, the necessity of using appropriate instructional methods for new theoretical and practical skills in students is clear. The purpose of this study is comparing the effects of three methods lecture, problem solving, and computer-assisted self learning on the drug calculation skill on thi...
Title of Dissertation: Discovering and Securing Shared Resources on the Internet Rob Sherwood, Doctor of Philosophy, 2008 Dissertation directed by: Associate Professor Samrat Bhattacharjee and Assistant Professor Neil Spring Department of Computer Science The Internet is a collection of shared resources. Internet users share bandwidth and processing resources both in the network at routers and ...
This study describes a method to detect hijacked journals based on the analysis of archives clone journals. approach is most effective in discovering network that have same organizer(s). Analysis allowed 62 URLs It also provided possibility predict two websites before they became operational. shows detected represent organized by one or several fraudulent individuals. The information and conten...
dry eye is the major contributor to computer vision syndrome. the reductions in the blink rate and amplitude have been considered as the possible mechanisms leading to this condition. the purpose of this study is to evaluate the changes in the lower tear meniscus heights and areas in the computer reading task, in dry eye subjects, with and without soft contact lenses. in this quasi-experimental...
Complex networks exist in a wide array of diverse domains, ranging from biology, sociology, and computer science. These real-world networks, while disparate in nature, often comprise of a set of loose clusters(a.k.a communities), whose members are better connected to each other than to the rest of the network. Discovering such inherent community structures can lead to deeper understanding about...
objective: to evaluate the importance of observing healthy habits by pregnant women that influences different aspects of mother and fetus health, we assessed the change in dietary behavior, and cigarette smoking after distributing the guidelines among 485 prenatal care patients. | materials and methods: the subjects were pregnant women who enrolled in health care centers of tehran university fr...
clinical databases can be categorized as big data, include large quantities of information about patients and their medical conditions. analyzing the quantitative and qualitative clinical data in addition with discovering relationships among huge number of samples using data mining techniques could unveil hidden medical knowledge in terms of correlation and association of apparently independent...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید