نتایج جستجو برای: reverse engineering approach

تعداد نتایج: 1595602  

Journal: :iranian journal of cancer prevention 0
pegah khosravi 1. dept. of bioinformatics, institute of biochemistry and biophysics (ibb), university of tehran, tehran, iran 2. school of biological sciences, institute for research in fundamental sciences (ipm), tehran, iran javad zahiri 1. faculty of mathematics, k. n. toosi university of technology, tehran, iran 2. dept. of bioinformatics, institute of biochemistry and biophysics (ibb), university of tehran, tehran, iran vahid h. gazestani institute of parasitology, mcgill university, montreal, quebec, canada samira mirkhalaf dept. of bioinformatics, institute of biochemistry and biophysics (ibb), university of tehran, tehran, iran mohammad akbarzadeh dept. of bioinformatics, institute of biochemistry and biophysics (ibb), university of tehran, tehran, iran mehdi sadeghi 1.national institute of genetic engineering and biotechnology, tehran, iran 2.school of biological sciences, institute for research in fundamental sciences (ipm), tehran, iran

background prostate cancer is a serious genetic disease known as the first widespread cancer in men, yet the molecular changes required for the cancer progression is not fully understood. availability of high-throughput gene expression data has led to the development of various computational methods for the identification of critical genes involved in the cancer. methods in this paper, we show ...

2015
Joseph Fong

As Extensible Markup Language (XML) (Bray, 2004) has become the standard document format, the chance that users have to deal with XML documents with different structures is increasing. If the schema of the XML documents in Document Type Definition (DTD) (Bosak, 1998) is given or derived from the XML documents right away (Kay, 1999; Moh, 2000), it is easier to study the contents of the XML docum...

Journal: :Computer-Aided Design and Applications 2014

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

2005
Árpád Beszédes Rudolf Ferenc Tibor Gyimóthy

In this paper we present our approach to several common problems in reverse engineering that are built around the Columbus framework. Columbus defines several fundamental building blocks for the use in reverse engineering processes, and as such it can be an important player in the studies conducted at the workshop for Empirical Studies in Reverse Engineering. The Columbus framework proved its u...

Journal: :The International Journal of Advanced Manufacturing Technology 2006

Journal: :Science of Computer Programming 2000

Journal: :international journal of advanced design and manufacturing technology 0
mohammadmahdi amiri research institute of petroleum industry (ripi),

nowadays cmm machines are widely used in surface measurement and inspection. as inspection results from cmm machine are obtained by the means of measuring surfaces with direct contact, they are more precise than non-contact method (like optical measurement). however, cmm machines give more reliable and accurate results rather than non-contact methods but also these results come with error when ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید