Results 21 to 30 of about 573,305 (197)

Programming in Biomolecular Computation

open access: yesElectronic Notes in Theoretical Computer Science, 2010
AbstractOur goal is to provide a top-down approach to biomolecular computation. In spite of widespread discussion about connections between biology and computation, one question seems notable by its absence: Where are the programs? We introduce a model of computation that is evidently programmable, by programs reminiscent of low-level computer machine ...
Hartmann, Lars Røeboe   +2 more
openaire   +3 more sources

Development and use of a computer program to detect potentially inappropriate prescribing in older adults residing in Canadian long-term care facilities

open access: yesBMC Geriatrics, 2002
Background Inappropriate prescribing has been estimated to be as high as 40% in long-term care. The purpose of this study was to develop a computer program that identifies potentially inappropriate drug prescriptions and to test its reliability.
Ferko Nicole   +6 more
doaj   +1 more source

Program komputerowy w orzecznictwie organów ochrony prawnej

open access: yesActa Iuris Stetinensis, 2017
The rapid development of computing has come at the second half of 20th century. Back in the last century, we can see specific rules about computer programs. From this is born the need of a balanced position of jurisprudence about computer programs.
Łukasz Zimończyk
doaj   +1 more source

Computer programming as an art [PDF]

open access: yesCommunications of the ACM, 1974
When Communications of the ACM began publication in 1959, the members of ACM's Editorial Board made the following remark as they described the purposes of ACM's periodicals [2]: “If computer programming is to become an important part of computer research and development, a transition of programming from an art to a ...
openaire   +3 more sources

Harmful computer programs in the criminal legislation of the Russian Federation

open access: yesПутеводитель предпринимателя, 2020
Various points of view on definition of the harmful program in criminal law are presented in the present article. Classification is given and features of different types of harmful programs and programs which can be used as harmful are revealed. Author’s
V. V. Vorobyov
doaj  

MODELLING THE KINEMATICS OF A HINGED-ROD HYDRAULIC MANIPULATOR [PDF]

open access: yesVolga Region Farmland, 2020
The article considers the possibility of determining the kinematic parameters of hydraulic ma-nipulators that have a hinged-rod boom as a supporting structure.
N.V. Babochenko, Antvi-Wilson Papa
doaj   +1 more source

Generate the three roots of Arabic vocabulary using a Computer program [PDF]

open access: yesمجلة التربية والعلم, 1999
The research deals with using computer program in Arabic linguistic sciences through making it contribute in time economy in addition to its nature as a means of teaching and learning. A user of a computer can recognize the great difference and advantage
Muna Hamde
doaj   +1 more source

Designing of the Software Program “Epidemic Potential of Natural Plague Foci in the Territory of the Russian Federation”

open access: yesПроблемы особо опасных инфекций, 2014
Designed has been a computer program “Epidemic potential of natural plague foci in the Russian Federation” applied for the automatized evaluation of the epidemic hazard level of natural plague foci in relation to the population residing on the territory ...
E. V. Kouklev   +3 more
doaj   +1 more source

Medication supply chain management through implementation of a hospital pharmacy computerized inventory program in Haiti [PDF]

open access: yesGlobal Health Action, 2015
Background: In the aftermath of the 2010 earthquake in Haiti, St. Luke Hospital was built to help manage the mass casualties and subsequent cholera epidemic. A major problem faced by the hospital system was the lack of an available and sustainable supply
Michelle R. Holm   +2 more
doaj   +1 more source

Verification of program computations

open access: yes, 2015
Die formale Verifikation der Implementierung komplexer Algorithmen ist schwierig. Sie übersteigt die Möglichkeiten der heutigen Verifikationswerkzeuge und erfordert für gewöhnlich komplexe mathematische Theoreme. Zertifizierende Algorithmen berechnen zu jeder Ausgabe ein Zerfitikat, das die Korrektheit der Antwort bestätigt. Ein Checker für ein solches
Kurt Mehlhorn   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy