نتایج جستجو برای: paradigms
تعداد نتایج: 26414 فیلتر نتایج به سال:
I intend to use the streaming model as the basis for Admiral 2, particularly that of the StreamIt language [1]. In this model, a program consists of multiple independent filters, each of which consists of a steady-state function that computes a fixed number of outputs from a fixed number of inputs. These filters are composed hierarchically into a streaming graph, where edges correspond to the f...
disciplined inquiry about problems of organization and management requires decision to be taken about an appropriate research deign. in making such a decision, the researcher tacitly assumes a philosophical point of view or a research paradigm. there are four research paradigms which are the basis for the selection of research methodology and research methods. these paradigms include: a) positi...
Neuroleptics are widely prescribed drugs for the treatment of schizophrenia and related psychiatric disorders. Tardive dyskinesia (TD) is a late complication of prolonged neuroleptic treatment. Despite much research, the pathogenesis of TD remains elusive. It may be caused by loss of dopaminergic cells, due to free radicals as a product of high synaptic dopamine levels. Tardive dyskinesia has b...
Neuroleptics are widely prescribed drugs for the treatment of schizophrenia and related psychiatric disorders. Tardive dyskinesia (TD) is a late complication of prolonged neuroleptic treatment. Despite much research, the pathogenesis of TD remains elusive. It may be caused by loss of dopaminergic cells, due to free radicals as a product of high synaptic dopamine levels. Tardive dyskinesia has b...
Biomolecular Computation (BMC) is computation done at the molecular scale, using biotechnology techniques. This paper discusses the underlying biotechnology that BMC may utilize, and surveys a number of distinct paradigms for doing BMC. We also identify a number of key future experimental milestones for the eld of BMC.
With the extensive development of applications of public key cryptography, the need for supporting infrastructure arose. It became clear that a person can not just use another person’s public key obtained in some way, but he also has to be sure that the key and its claimed owner really belong together and that the connection is not expired. One of the oldest and most widespread ideologies to sa...
Change comes as a surprise because things do not happen in a straight line. Concepts often evolve haphazardly, reacting to specific events. Assumptions are made but are not challenged, sometimes for political or social expedience. It has long been recognized that the dose makes the poison. Concepts of the relationship evolved from both events and the availability of exploratory tools. There are...
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opin...
Serious roadblocks have been encountered in several areas of computer application, for example in the solution of intractable (NP-complete) combinatorial problems, or in the simulation of fluid flow. In this talk we will explore two alternatives to the usual kinds of computers, and ask if they provide some hope of ultimately by-passing what appear to be essential difficulties. Analog computatio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید