نتایج جستجو برای: compromising approach
تعداد نتایج: 1299112 فیلتر نتایج به سال:
The VIKOR (VlseKriterijumska Optimizacija I Kompromisno Resenje) method, which is a multi-criteria decision-making examined in this paper. like other MCDM techniques such as the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), widely used solve complex problems various fields engineering, management, and finance. This paper provides an overview including its applicati...
the present paper investigates how far ideologies can be tease out in discourse by examining the employed schemata by two ideologically opposed news media, the bbc and press tv, to report syria crisis during a period of nine months in 2011. by assuming that news is not a valuefree construction of facts and drawing on micro structural approach of schema theory, for the first time in discours...
The management of musculoskeletal tumours has progressed tremendously over the past few decades. Limb salvage surgery has become a standard practise without compromising the oncological outcome. Patients generally will benefit with superior function and a better quality of life compared with definitive amputation. The multidisciplinary approach and advancement of surgeries are important to achi...
We view match as an operator that takes two graph-like structures (e.g., XML schemas) and produces a mapping between the nodes of these graphs that correspond semantically to each other. Semantic schema matching is based on the two ideas: (i) we discover mappings by computing semantic relations (e.g., equivalence, more general); (ii) we determine semantic relations by analyzing the meaning (con...
Active control of defect structures and associated polarization switching in a ferroelectric material is achieved without compromising its ferroelectric properties. Based on dipolar interaction between defect dipole and polarization, the unique functionality of the defect dipole to control ferroelectric switching is visualized. This approach can provide a foundation for novel ferroelectric appl...
A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, we consider a framework for the prevention of agent tampering without compromising the mobility or autonomy of the agent. Our approach uses encrypted functions. We present an RSA implementation which answers affirmatively the open problem on undetachable signatures o...
In this issue of Cell Stem Cell, Warren et al. (2010) describe a new methodology, using synthetic mRNA, for efficiently generating iPSCs without compromising genomic integrity. This powerful approach can also be used for directed differentiation of iPSCs, or even for trans-differentiation to generate clinically relevant differentiated cell types.
We describe a rapid and quantitative method to generate DNA cages of deliberately designed geometry from readily available starting strands. Balancing the incorporation of sequence uniqueness and symmetry in a face-centered approach to 3D construction can result in triangular (TP), rectangular (RP), and pentagonal prisms (PP) without compromising the potential for nanostructure addressability.
Exhaustive global array data flow analysis for communication optimization is expensive and considered to be impractical for large programs. This paper proposes a demand-driven analysis approach that reduces the analysis cost by computing only the data flow information related to optimizations. In addition, the analysis cost of our scheme can be effectively managed by trading space for time or c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید