نتایج جستجو برای: based one specifically

تعداد نتایج: 4544800  

Journal: :European Journal of Biochemistry 2000

Introduction: Diseases of heart failure are considered as one of the main challenges of health care systems. One of the main components of care models in heart failure is patient involvement. In this regard, the adaptation model (RAM) is one of the most popular and most widely used nursing patterns that specifically address compatibility issues. The purpose of this article is to review the adap...

Introduction: Head and neck squamous cell carcinoma is one of the most important causes of morbidity and mortality. It has several histologic subtypes, among which papillary squamous cell carcinoma (pscc) is a rare one, specifically in upper aerodigestive tract. It was first introduced in 1990, which proved to have poor prognosis. In this study, a 72-year old female was introduced with ethmoida...

2002
Dave Clarke Andres Löh

Generic H A SKELL exploits the promising new incarnation of generic programming due to Hinze. Apart from extending the programming language Haskell, Hinze-style polytypism offers a simple approach to defining generic functions which are applicable to types of all kinds. Here we explore a number of simple but significant extensions to Hinze’s ideas which make generic programming both more expres...

The challenge of mobilizing knowledge to improve patient care, population health and ensure effective use of resources is an enduring one in healthcare systems across the world. This commentary reflects on an earlier paper by Ferlie and colleagues that proposes the resource-based view (RBV) of the firm as a useful theoretical lens through which to study knowledge mobilization in healthcare. Spe...

Journal: :Nature Reviews Microbiology 2006

Journal: :BMJ Supportive & Palliative Care 2013

Journal: :Des. Codes Cryptography 2007
Chris J. Mitchell Fred Piper Peter R. Wild

A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption schemes. We use a general technique which is applied to multi-signature versions of the one-time signature scheme of Lamport and to a public key encryption scheme based on a symmetric block cipher which we present. We ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید