نتایج جستجو برای: ray assumption are handled by vzf
تعداد نتایج: 9050188 فیلتر نتایج به سال:
hedging is a multi-purpose rhetorical strategy which is usually used in scientific arguments to secure ratification of claims, reduce the risk of negation, avoid conflict, manage disagreement and leave room for the audience to assess presented information. hedges are frequently used in research articles to mitigate the findings of research endeavors. the present research aims to investigate the...
heuristics are often used to provide solutions for flow shop scheduling problems.the performance of a heuristic is usually judged by comparing solutions and run times on test cases.this investigation proposes an analytical alternative ,called asymptotic convergence ,which tests the convergence of the heuristic to a lower bound as problem size grows. the test is a stronger variation of worst cas...
most of the verbal constructions of harzani dialect have got inflectional affixes. the majority of the constructions are made up vy adding a specific verbal affix to the verbal stem (infinitive without infinitive marker). only a few number of them is formed by adding a verbal affix to the past participle of the verb. there are specific rules for the formation of different verbal types. there is...
saluk mount is selected for devonian biostratigraphy. this area located at southwest of bojnurd. in this study three sections are selected and two sections, chahar-borj and tabar sections with a thickness of 650 m, which consist mainly of calcareous sediments was studied in detailed but third section, qelli section, with a thickness of about 450m which consist mainly of sandstone and evaporates...
In this paper, an optimal control problem governed by a class of p-Laplacian elliptic equations is studied. particular, as no monotonicity assumption assumed on the nonlinear term, state equation non well-posed, which may admit several solutions for one control. To obtain optimality conditions pair, multiplicity and singularity/degeneracy need to be handled respectively. For reason, penalizatio...
abstract target-oriented approaches to translation studies are regarded as recent theories of translation. one of the most famous theories among these approaches is descriptive translation studies presented by toury (1995). this theory gives a new dimension to translation studies and gives importance to the descriptive rather than prescriptive studies. it also identifies three sets of transla...
Most cryptographic protocols, in particular asymmetric protocols, are based on assumptions about the computational complexity of mathematical problems. The Φ-Hiding assumption is such an assumption. It states that if p1 and p2 are small primes exactly one of which divides φ(N), where N is a number whose factorization is unknown and φ is Euler’s totient function, then there is no polynomialtime ...
The repertoire of set operators available in Constructive Solid Geometry (CSG) may be extended by the Minkowski addition and subtraction operators. In this way the problem of visualizing 3D solids deened as a Minkowski addition or subtraction of elementary objects can be solved by using CSG in combination with ray tracing. The method consists in transforming a Minkowski term with multiple opera...
Most cryptographic protocols, in particular asymmetric protocols, are based on assumptions about the computational complexity of mathematical problems. The Φ-Hiding assumption is such an assumption. It states that if p1 and p2 are small primes exactly one of which divides φ(N), where N is a number whose factorization is unknown and φ is Euler’s totient function, then there is no polynomialtime ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید