نتایج جستجو برای: driven learning ddl
تعداد نتایج: 811417 فیلتر نتایج به سال:
Current image retrieval systems have many important limitations. Many are specialized for a particular class of images and/or queries. The more general systems support relatively weak querying by content (e.g., by color, texture or shape, but with no deeper understanding of the structure of the image). Few (if any) have addressed the issue of truly large collections of images, and how the under...
The global expansion of the Web brings the global computing; and the increasing number of problems with increasing complexity & sophistication also makes collaboration desirable. In this paper, we presented a semanticsbased framework for collaborative problem solving in agent grid by coupling joint intention and dynamic description logics (DDL), our previous work to extend description logics (D...
BACKGROUND ATP-dependent D-alanine:D-alanine ligase (Ddl) is a part of biochemical machinery involved in peptidoglycan biosynthesis, as it catalyzes the formation of the terminal D-ala-D-ala dipeptide of the peptidoglycan precursor UDPMurNAc-pentapeptide. Inhibition of Ddl prevents bacterial growth, which makes this enzyme an attractive and viable target in the urgent search of novel effective ...
A novel continuous-wave (CW) direct detection lidar (DDL) is demonstrated to be capable of wind speed measurement 40 m away with an update rate 4 Hz using a fiber-based scanning Fabry–Perot interferometer as optical frequency discriminator. The proposed CW DDL has large dynamic range no sign ambiguity and its sensitivity assessed by comparing performance that coherent (CDL) in side-by-side meas...
the aim of the current study was to investigate the relationship among efl learners learning style preferences, use of language learning strategies, and autonomy. a total of 148 male and female learners, between the ages of 18 and 30, majoring in english literature and english translation at islamic azad university, central tehran were randomly selected. a package of three questionnaires was ad...
Integrity constraints are rules which should guarantee the integrity of a database. Provided that an adequate mechanism to express them is available, the following question arises: is there any way to populate a database which satisfies the constraints supplied by a designer? i.e., does the database schema, including constraints, admit at least one model in which all classes are non-empty? This...
Effective utilization of cache memories is a key factor in achieving high performance in computing the Discrete Fourier Transform (DFT). Most optimization techniques for computing the DFT rely on either modifying the computation and data access order or exploiting low level platform specific details, while keeping the data layout in memory static. In this paper, we propose a high level optimiza...
Risk Factor Analysis for C5 Palsy after Double-Door Laminoplasty for Cervical Spondylotic Myelopathy
STUDY DESIGN A retrospective comparative study. PURPOSE To clarify the risk factors related to the development of postoperative C5 palsy through radiological studies after cervical double-door laminoplasty (DDL). OVERVIEW OF LITERATURE Although postoperative C5 palsy is generally considered to be the result of damage to the nerve root or segmental spinal cord, the associated pathology remai...
d-Cycloserine is an effective second line antibiotic used as a last resort to treat multi (MDR)- and extensively (XDR) drug resistant strains of Mycobacterium tuberculosis . d-Cycloserine interferes with the formation of peptidoglycan biosynthesis by competitive inhibition of alanine racemase (Alr) and d-alanine-d-alanine ligase (Ddl). Although the two enzymes are known to be inhibited, the in ...
All currently available Network-based Intrusion Detection Systems (NIDS) rely upon passive protocol analysis which is fundamentally flawed as an attack can evade detection by exploiting ambiguities in the traffic stream as seen by the NIDS. We observe that different attack variations can be derived from the original attack using simple transformations. This paper proposes a semantic model for a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید