منابع مشابه
How traditional symbols can be used as inspiration source in shaping the urban architecture?
This paper explores the developing of how designers can search for inspiration source which provided in the form of traditional elements and archetypes and also their role on idea generation in design from building to urban measure. In order to clarify of this, current study focuses on the Far-East region as an ancient part of the world in which there is a huge number of symbols like well known...
متن کاملHow can Alzheimer's Patients be Helped?
پرستاری از بیمار مبتلا به بیماری آلزایمر چندان ساده نیست. حتی اگر از این امر که اختلال رفتاری فرد نشانه ای از بیماری اوست، آگاه باشید، اکثر مواقع نمی دانید که چگونه باید با او رفتار کنید. در این مقاله روشهای مناسبی ارائه گردیده تا خانواده بیمار بتواند با ۱۰ اختلال رفتاری شایع در بیماران مبتلا بدون احساس ناامیدی و خشم سازگاری یابند.
متن کاملhow traditional symbols can be used as inspiration source in shaping the urban architecture?
this paper explores the developing of how designers can search for inspiration source which provided in the form of traditional elements and archetypes and also their role on idea generation in design from building to urban measure. in order to clarify of this, current study focuses on the far-east region as an ancient part of the world in which there is a huge number of symbols like well known...
متن کاملCan Formal Methods be Applied to Software Architecture?
The software architecture of a program or computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships among them. In other words, software architecture is the study of boxes and lines. For the most part, software architecture is informal in the sense that it is diÆcult to assign p...
متن کاملFPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science and Engineering Ethics
سال: 2008
ISSN: 1353-3452,1471-5546
DOI: 10.1007/s11948-008-9112-3