نتایج جستجو برای: and similarly

تعداد نتایج: 16827849  

Journal: :journal of algorithms and computation 0
mahmood shabankhah university of tehran, college of engineering, department of engineering science

many graph theoretical parameters have been used to describe the vulnerability of communication networks, including toughness, binding number, rate of disruption, neighbor-connectivity, integrity, mean integrity, edgeconnectivity vector, l-connectivity and tenacity. in this paper we discuss integrity and its properties in vulnerability calculation. the integrity of a graph g, i(g), is defined t...

Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including toughness, binding number, rate of disruption, neighbor-connectivity, integrity, mean integrity, edgeconnectivity vector, l-connectivity and tenacity. In this paper we discuss Integrity and its properties in vulnerability calculation. The integrity of a graph G, I(G), is defined t...

Journal: :Attention, perception & psychophysics 2021

Holistic processing has been shown with both faces and words, but it is unclear how similar their underlying mechanisms are. In this study attention to global local features was manipulated the consequences for holistic word face were examined. On each trial participants presented two Navon figures told focus on either or level. Then they performed a composite task in which indicated whether ta...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید