نتایج جستجو برای: انکس 13

تعداد نتایج: 332548  

رهبری منش, علی‌اکبر, زندکریمی, محمدرضا, سلامتی, پیمان, نادری, فریبا,

Background: Ekiri syndrome or lethal toxic encephalopathy is a complication of shigellosis with dysentery, hyperpyrexia, seizures, headache and altered level of consiousness, which rapidly progresses to death. These children die at the beginning of the disease (8-48 hours from the beginning of symptoms), from brain edema. However they had no symptoms or signs of sepsis, dehydration, DIC or Hemo...

2011
Mark Braverman Gabriel Cadamuro

Communication complexity roughly asks how much two information two parties need to exchange between one another in order to compute a function on their inputs. This has applications in areas like circuit design, where we can model a board as being partitioned in two halves and we wish to find how how information has to pass from one partition to another. Of course, there are also many applicati...

2005
Paul Garrett

would be a square. One could factor this into primes in Z to see that it is not a square, or hope that it is not a square modulo some relatively small prime. Indeed, modulo 11 it is 2, which is not a square modulo 11 (by brute force, or by Euler’s criterion (using the cyclicness of (Z/11)×) 2(11−1)/2 = −1 mod 11, or by recalling the part of Quadratic Reciprocity that asserts that 2 is a square ...

2006
Joan Vernikos William Paloski Charles Fuller Gilles Clément

2009
Christopher W. Fink

INTRODUCTION Additive manufacturing (AM) refers to a process that builds up a component in layers, as opposed to a subtractive operation, which removes matter from a block of material to form a product.[1,2] An increase in customer demand for customizable, quick turnaround, low cost products has opened the door for AM processes to enter the large scale production market once dominated by subtra...

2006
G. DOUNIAS B. BJERREGAARD J. JANTZEN A. TSAKONAS N. AMPAZIS G. PANAGI E. PANOURGIAS

In this study the performance of various intelligent methodologies is compared in the task of pap-smear diagnosis. The selected intelligent methodologies are briefly described and explained, and then, the acquired results are presented and discussed for their comprehensibility and usefulness to medical staff, either for fault diagnosis tasks, or for the construction of automated computer-assist...

1998
Dario Maestripieri Kelly A. Carroll

VOL. 9, NO. 2, MARCH 1998 Copyright © 1998 American Psychological Society 143 Abstract— This study investigated maternal abuse and neglect of offspring in a large population of rhesus monkeys over a period of 29 years. Abuse and neglect did not occur together and were associated with different risk factors. Infant abuse was concentrated in 8 of 57 families and among closely related females. Abu...

2018
Meenakshi Sundaram A. C. Nandini

For an efficient image security, image hashing is one of the solutions for image authentication. A robust image hashing mechanism must be robust to image processing operations as well as geometric distortions. A better hashing technique must ensure an efficient detection of image forgery like insertion, deletion, replacement of objects, malicious color tampering, and for locating the exact forg...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید