نتایج جستجو برای: craig geffen morse analytical method

تعداد نتایج: 1758601  

2011
Marcio Augusto Alfonso de Almeida Andrea Roseli Vançan Russo Horimoto Paulo Sérgio Lopes de Oliveira José Eduardo Krieger Alexandre da Costa Pereira

Rare variants are becoming the new candidates in the search for genetic variants that predispose individuals to a phenotype of interest. Their low prevalence in a population requires the development of dedicated detection and analytical methods. A family-based approach could greatly enhance their detection and interpretation because rare variants are nearly family specific. In this report, we t...

Journal: :Molecules 2012
Bong-Hyun Jun Homan Kang Yoon-Sik Lee Dae Hong Jeong

Potential utilization of proteins for early detection and diagnosis of various diseases has drawn considerable interest in the development of protein-based multiplex detection techniques. Among the various techniques for high-throughput protein screening, optically-encoded beads combined with fluorescence-based target monitoring have great advantages over the planar array-based multiplexing ass...

Journal: :Vision Research 2004
T. Maddess Y. Nagai A. C. James A. Ankiewcz

A quantitative method is presented for creating a large number of classes of binary (256) and ternary (7.62 x 10(12)) textures. The binary textures are presented as black and white (contrasts -1 and 1). The ternary textures have three levels: black, white and the mean luminance gray (contrasts -1, 0 and 1). The ternary patterns in particular display a wide variety of properties, including depth...

2014
Andrew Allison Charles E. M. Pearce Derek Abbott

We develop a method for systematically constructing Lagrangian functions for dissipative mechanical, electrical, and electromechanical systems. We derive the equations of motion for some typical electromechanical systems using deterministic principles that are strictly variational. We do not use any ad hoc features that are added on after the analysis has been completed, such as the Rayleigh di...

1998
M. Fjeld S. Schluep M. Rauterberg

Behaviour of expert and novice database users solving the same task was recorded. Several successful strategies were identified. Since there are more users than strategies, some users applied the same strategy. The aim was to develop methods grouping users with common strategy. Following three approaches (correlation, intersection, and exclusion), a metric among task solving behavioural sequenc...

Journal: :Disasters 2001
L Stephen T E Downing

This paper introduces broad concepts of vulnerability, food security and famine. It argues that the concepts and theories driving development and implementation of vulnerability assessment tools are related to their utility. The review concludes that socio-geographic scale is a key issue, and challenge. It analyses three vulnerability assessment (VA) methods, using Ethiopia as a case study. Fac...

2016
Arpan Patel Jihane N. Benhammou Gordon V. Ohning Michael Lewis David Ishimitsu Joseph R. Pisegna

Arpan Patel1, Jihane N. Benhammou1, Gordon V. Ohning2, Michael Lewis3, David Ishimitsu4, Joseph R. Pisegna2* 1Division of Digestive Diseases, Department of Medicine, David Geffen School of Medicine at UCLA, CA 2Division of Gastroenterology, Hepatology and Parenteral Nutrition, Department of Medicine VA Greater Los Angeles Healthcare System and Department of Medicine David Geffen School of Medic...

2005
Gail A. Greendale Shana L. Palla Giske Ursin Gail A. Laughlin Carolyn Crandall Malcolm C. Pike Beth A. Reboussin

1 Division of Geriatrics, David Geffen School of Medicine at University of California, Los Angeles, Los Angeles, CA. 2 Department of Public Health Sciences, Wake Forest University School of Medicine, Winston-Salem, NC. 3 Department of Preventive Medicine/Norris Comprehensive Cancer Center, University of Southern California Keck School of Medicine, Los Angeles, CA. 4 Department of Family and Pre...

2005
Jeffrey Ketland

Proof of Craig’s Theorem: Assume that S is a deductively closed set of sentences, whose elements may be recursively enumerated thus F(0), F(1), ..., F(n), ..., where F is a recursive function from natural numbers to sentences (we assume that expressions, sentences, etc., have been Gödel-coded in some manner). The set of theorems of an axiomatic theory is automatically recursively enumerable. Bu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید