نتایج جستجو برای: o yekshab manuscript mirza baba
تعداد نتایج: 589032 فیلتر نتایج به سال:
Algorithmic decipherment is a prime example of a truly unsupervised problem. The first step in the decipherment process is the identification of the encrypted language. We propose three methods for determining the source language of a document enciphered with a monoalphabetic substitution cipher. The best method achieves 97% accuracy on 380 languages. We then present an approach to decoding ana...
تحلیل بیان ژن های فعال شده توسط baba در گیاه گوجه فرنگی در پاسخ به تنش های زیستی و غیرزیستی pr1به عنوان یک نشانگر در مسیر سیگنالینگ سالیسیلیک اسید (sa)، nced در بیوسنتز آبسیزیک اسید (aba) و spr2 در مسیر سنتز جاسمونیک اسید (ja)ژن هایی هستند که تغییر بیان آنها به عنوان نشانگری برای دخیل بودن هورمون های aba، ja و sa در تیمار خاص و یا مقابله با تنش در گیاهان مطرح است. میزان بیان هر سه ژن ...
Although Nastaliq script was used as a significant writing style along other six types of calligraphy until the mid-Safavid era, it was gradually more welcomed and turned into the most important script in the succeeding eras. "Rashida Shahnameh", written by Abdul Rashid Deylami, falls within the Shahnameh manuscripts in the Safavid era while "Davari Shahnameh", written by Mirza Mohammad Davari ...
Vol. LII (August 2015), 467–481 467 © 2015, American Marketing Association ISSN: 0022-2437 (print), 1547-7193 (electronic) *Uma R. Karmarkar is Assistant Professor in Marketing, Harvard Business School, Harvard University (e-mail: [email protected]). Baba Shiv is the Sanwa Bank, Limited, Professor of Marketing, Graduate School of Business, Stanford University (e-mail: [email protected]...
The aim of this project is to research the possibilities of applying unsupervised learning techniques for natural language and other sequential data to undeciphered texts and manuscripts. The undeciphered text used is the Voynich Manuscript, a mysterious book from the 15th or 16th century that is written in an unknown script. Some methods that could be applied to manuscripts such as these will ...
Introduction 2 1. The Group Law on Pell Conics and Elliptic Curves 2 1.1. Group Law on Conics 2 1.2. Group Law on Elliptic curves 3 2. The Group Structure 3 2.1. Finite Fields 3 2.2. p-adic Numbers 3 2.3. Integral and Rational Points 4 3. Applications 4 3.1. Primality Tests 4 3.2. Factorization Methods 5 4. 2-Descent 5 4.1. Selmer and Tate-Shafarevich Group 5 4.2. Heights 6 5. Analytic Methods ...
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evidence to get justice from the Caliph. On the other hand, Ali Baba wants to be able to securely access to the cave without leaking any evidence. A similar scenario holds in the biometric passport application: Ali Baba w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید