نتایج جستجو برای: آیۀ 17 هود

تعداد نتایج: 274291  

2006
TRIAS THIREOU SOTIRIS PAVLOPOULOS GEORGE KONTAXAKIS ANDRES SANTOS

The analysis of dynamic positron emission tomography (PET) studies provides clinically useful parametric information, but often requires complex and timeconsuming compartmental or non-compartmental techniques. Independent component analysis (ICA), a statistical method used for feature extraction and signal separation, is applied to dynamic PET studies to facilitate the initial interpretation an...

2002
KATRINA MOFFAT ALEX McCONNACHIE JACKI GORDON PHILIP WILSON

Background. The management and detection of depression varies widely, and the causes of variation are incompletely understood. Aims. To describe and explain general practitioners’ (GPs’) current practice in the recognition and management of depression in young adults, their attitudes towards depression, and to investigate associations of GP characteristics and patient sex with management. Metho...

2017
Kumara Sastry David Goldberg Manju Sharma

A genetic algorithm is one of a class of algorithms that searches a solution space for the optimal solution to a problem. First part of this work consists of basic information about Genetic algorithm like what are Individual, Population, Crossover, Genes, Binary Encoding, Flipping, Crossover probability, Mutation probability. What is it used for, what is their aim. In this article the methods o...

Journal: :Cancer research 2009
Nathalie Gaspar Swee Y Sharp Simon Pacey Chris Jones Michael Walton Gilles Vassal Suzanne Eccles Andrew Pearson Paul Workman

Heat shock protein 90 (HSP90) inhibitors, such as 17-allylamino-17-demethoxygeldanamycin (17-AAG, tanespimycin), which is currently in phase II/phase III clinical trials, are promising new anticancer agents. Here, we explored acquired resistance to HSP90 inhibitors in glioblastoma (GB), a primary brain tumor with poor prognosis. GB cells were exposed continuously to increased 17-AAG concentrati...

2018
M. I. Chehab Piotr Dorosz

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main prob...

2009
Jonathan Kelner

Claim of Johnson-Lindenstrauss Theorem: The Euclidean metric on any finite set X (a bunch of high dimensional points) can be embedded with distortion D = 1 + ε in R for k = O(ε−2 log n). If we lose ε (ε = 0), it becomes almost impossible to do better than that in R. Nevertheless, it is not hard to construct a counter example to this: a simplex of n+ 1 points. The Johnson-Lindenstrauss theorem g...

2011
Angel Petropanagos A. Petropanagos

Of course some women, for various reasons, choose to embrace motherhood later than their own mothers. But many, like me, become older mothers because there was no other choice. It’s just how my life unfolded. . . . To suggest that most women are choosing to delay child-bearing is to suggest that women have an incredible level of control over their lives. In the real world this is just not true....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید