Adoption of e-government in three Latin American countries[taliem.ir]

Adoption of e-government in three Latin American countries: Argentina, Brazil and Mexico

This paper discusses the adoption of e-government in three Latin American countries: Argentina, Brazil and Mexico. The study first presents a conceptual framework to examine the development and services of e-government, which is applied to assess its adoption in these leading Latin American economies. Study findings can shed some light on each nation as a model for successful development as well as the implementation of e-government in a non-industrialized, developing nation. The analysis also seeks to fill a void in the study of e-government in less developed nations, most of which are trying to catch up with their developed counterparts in this crucial aspect of digital governmental development.
Comparative Study of Web 1.0, Web 2.0 and Web 3.0[taliem.ir]

Comparative Study of Web 1.0, Web 2.0 and Web 3.0

The WWW is more and more used for application to application communication. The programmatic interfaces made available are referred to as web services. Most people today can hardly conceive of life without the internet. The web of documents has morphed into a web of data. The semantic wave embraces three stages of internet growth. The first stage, web 1.0, was about connecting information and getting on the net. Web 2.0 is about connecting people putting the “I” in user interface, and the “we” into a web of social participation. The next stage, web 3.0, is starting now. It is about representing meanings, connecting knowledge, and putting them to work in ways that make our experience of internet more relevant, useful, and enjoyable.
Basic Concepts and Taxonomy of[taliem.ir]

Basic Concepts and Taxonomy of Dependable and Secure Computing

This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic definitions are given first. They are then commented upon, and supplemented by additional definitions, which address the threats to dependability and security (faults, errors, failures), their attributes, and the means for their achievement (fault prevention, fault tolerance, fault removal, fault forecasting). The aim is to explicate a set of general concepts, of relevance across a wide range of situations and, therefore, helping communication and cooperation among a number of scientific and technical communities, including ones that are concentrating on particular types of system, of system failures, or of causes of system failures.
CommunicationFacilities[taliem.ir]

Communication Facilities for Distributed Transaction-Processing Systems

Distributed transaction-processing systems must manage such functions as concurrency, recovery, and replication. One way to improve their efficiency and reliability is to increase software modularity, which means the separate components should execute in separate address spaces to permit hardware-enforced separation. This structure offers advantages but demands efficient interprocess communication (IPC) services. In our research at Purdue University, we are investigating mechanisms and paradigms for efficient communication support in conventional architectures, such as virtual-memory, single-processor machines with no special IPC hardware support. (Some mainframes have hardware assistance where more than one address space can be accessed at the same time.) We are studying communication designs in the context of the Raid system, a robust and adaptable distributed database system for transaction processing.' Raid has been developed at Purdue on Sun workstations under the Unix operating Communication svstem in a local area network. software is critical in distributed computing systems. This research identifies efficient mechanisms and paradigms for distributed transaction processing in a replicated database environment. In Raid, each major logical component is implemented as a server, which is a process in a separate address space. Servers interact with other processes through a high-level communication subsystem. Currently, Raid has six servers for transaction management: the user interface (UI). the action driver (AD), the access manager (AM), the atomicity controller (AC), the concurrency controller (CC), and the replication controller (RC). High-level name service is provided by a separate server, the oracle.
Age Synthesis and Estimation via Faces[taliem.ir]

Age Synthesis and Estimation via Faces: A Survey

Human age, as an important personal trait, can be directly inferred by distinct patterns emerging from the facial appearance. Derived from rapid advances in computer graphics and machine vision, computer-based age synthesis and estimation via faces have become particularly prevalent topics recently because of their explosively emerging real-world applications, such as forensic art, electronic customer relationship management, security control and surveillance monitoring, biometrics, entertainment, and cosmetology. Age synthesis is defined to rerender a face image aesthetically with natural aging and rejuvenating effects on theindividual face. Age estimation is defined to label a face image automatically with the exact age (year) or the age group (year range) of the individual face. Because of their particularity and complexity, both problems are attractive yet challenging to computer-based application system designers. Large efforts from both academia and industry have been devoted in the last a few decades. In thispaper, we survey the complete state-of-the-art techniques in the face image-based age synthesis and estimation topics. Existing models, popular algorithms, system performances, technical difficulties, popular face aging databases, evaluation protocols, and promising future directions are also provided with systematic discussions.
Asynchronous Data Fusion With Parallel[taliem.ir]

Asynchronous Data Fusion With Parallel Filtering Frame

This paper studies the design of data fusion algorithm for asynchronous system with integer times sampling. Firstly, the multisensor asynchronous samplings is mapped to the basic axis, accordingly a sampling sequence of single sensor can be taken. Secondly, aiming at the sensor with the densest sampling points, the modified parallel filtering is given. Afterwards, the sequential filtering fusion method is introduced to deal with the case that there are multiple mapped measurements at some sampling point. Finally, a novel parallel filtering fusion algorithm for asynchronous system with integer times sampling is proposed. Besides, a judgment scheme to distinguish measurement number at every sampling point in the fusion period is also designed. One simple computer numerical value simulation is demonstrated to validate the effectiveness of the judgment scheme and the proposed asynchronous fusion algorithm .
Severe Asthma[taliem.ir]

Severe Asthma

Bronchial asthma is now widely recognized as a heterogeneous clinical syndrome consisting of various disease phenotypes. Each asthma phenotype may have distinct observable molecular, cellular, morphological, functional, and clinical features , all of which can be possibly integrated into specifc biological mechanisms, called as endotypes . Although differentiating asthma into various phenotypes/endotypes remains speculative so far, these concepts of separation may be useful in characterizing and predicting disease severity, progression, and response to general and specifc therapies including biologic medications . This is particularly important for severe asthma patients who are refractory to current standard therapies including inhaled and systemic corticosteroids (CS) and bronchodilators. Because these patients account for a signifcant proportion of health-care expenditure of asthma , recognizing the heterogeneous nature of asthma, especially severe asthma, may enable us to develop safe and effective phenotype-targeted biological therapies.
Decoding the Antibody[taliem.ir]

Decoding the Antibody Repertoire

The last 30 years of the biotechnology revolution have to a great extent been fueled by the discovery and application of monoclonal antibodies for research and therapeutic purposes . Antibodies are Y-shaped molecules produced by the immune system of many vertebrates to recognize and neutralize foreign pathogens or toxins with very high specificity. The highly specific nature of antibody-antigen interactions provides a means of molecular targeting that is extremely useful both as scientific reagents and as clinical therapeutics. An antibody molecule is comprised of two major portions: the constant region (or Fc region), which does not vary among distinct antibody molecules with different specificities, and the variable region, which comprises a unique sequence for each antibody and is the region responsible for antigen recognition (Fig. 1.1). Binding to molecular targets occurs at the exposed ends of the variable region. Different antibody variable regions confer distinct antibody binding specificities conferred by their unique antibody amino acid sequences, which are in turn derived from somatic recombination of the immunoglobulin genes and subsequent clonal selection that occurs during B-cell development.
Global Perspectives , Hematopoietic Stem ,Cell Transplants ,(HSCTs)[taliem.ir]

Establishing a Hematopoietic Stem Cell Transplantation Unit

Intuitively, and ideally, patients, donors, and transplant physicians should know the requirements for, and the potential risks and benefts of hematopoietic stem cell transplant (HSCT) before they agree in a joint decision to proceed with a transplant procedure. Is there a reasonable chance for long-term survival with an acceptable quality of life compared with other therapeutic options? Has everything been undertaken to minimize the risks for the donor, whose beneft is solely altruistic? Is suffcient infrastructure available for the complex HSCT procedure, and will the costs be covered? As obvious as these questions are, answering them requires a great deal of information.
bannertaliem-taliem-ir

آشنایی با بورس اوراق بهادار و نحوه سرمایه گذاری در آن

حيطه فعاليت بورس اوراق بهادار با معاملات مربوط به انواع اوراق بهادار همانند سها عادی سهام ممتاز، اوراق قرضه و اوراق مشاركت (مختص ايران) مرتبط ميباشد. بورس اوراق بهادار مکانيزمي را فراهم ميكند تا از طريق آن پ ساندازهای اندك جامعه به سرمايه گذار ها كلان اقتصاد تبديل شود. اين ابزار كارآمد در كشورها پيشرفته دارا قدمت طولاني و در كشور ايران دارا پيشينه كوتاه مدت ميباشد. در ايران شروع فعاليت رسمي بورس به سال 1346بر ميگردد ولي آغاز فعاليت اصلي آن سال 1368كه همراه با اولين برنامه توسعه اقتصادی و اجتمایي است ميباشد. با توجه به اينکه با ار بورس اوراق بهادار ركن اصلي با ار سرمايه و با ار مالي است توسعه متناسب دو بخش اصلي اقتصاد يعني بخش مالي و واقعي از اهميت و جايگاه ويژه ای برخوردار ميباشد. طبق تئوری های اقتصاد در صورت هر گونه اخلال در رشد و توسعه بخش های مذكور يا عدم توسعه مناسب آنها رشد و توسعه اقتصاد دچار مشکل خواهد شد. كشورها توسعه يافته همواره دارای بخش مالي قدرتمند هستند كه بازار پول و بازار سرمايه ميباشند.