نتایج جستجو برای: secrecy of know how

تعداد نتایج: 21242317  

پایان نامه :0 1375

investigation the archetype of mother can help the reader to understand poes works, especially his fiction, better, if not fully. motivated by internal and external drives to get into the universe in its manifold form poe was impelled to art and, from various modes of art, to symbolism. how much was poe successful to produce works of art has been a matter of dispute among critics. however, ther...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده علوم انسانی 1393

postcolonial feminism, also dubbed as third world feminism, is an innovative approach, demonstrating the way women of colonized countries suffer from both native patriarchies and imperial ideology. also due to this double-colonization, postcolonial feminists contend that third world women are subjected to both colonial domination of empire and male domination of patriarchy. while western femini...

Journal: :international journal of electrical and electronics engineering 0
ali kuhestani amirkabir university of technology abbas mohammadi amirkabir university of technology mohammad javad emadi amirkabir university of technology

abstract—in this paper, the problem of secure transmission in two-hop amplify-and-forward (af) systems with an untrusted relay is investigated. to prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (dbcj) technique is used. in this method the destination sends an intended jamming signal to the relay. t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده جغرافیا 1392

adolescents and young adults and their problems is an issue whose importance is obvious to anyone because youth are the founders of our countrys future and requires proper planning to be on leisure. given the importance of leisure,this study to investigate needs assessment and planning how adolescents and young adults spend their leisure time in urban of case study of high school girls and boys...

2003
Stuart J.H. Graham

How do firms use secrecy to capture value from inventions? Can a strategic mix of secrecy and patent protections secure for the firm a competitive advantage when commercializing its new technologies? And what role does patent “disclosure” play as a strategic choice in winning for the firm super-normal profits from innovation? Answering these questions is fundamental if we are to understand the ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - پژوهشکده علوم انسانی و اجتماعی 1391

the central purpose of this study was to conduct a case study about the role of self monitoring in teacher’s use of motivational strategies. furthermore it focused on how these strategies affected students’ motivational behavior. although many studies have been done to investigate teachers’ motivational strategies use (cheng & d?rnyei, 2007; d?rnyei & csizer, 1998; green, 2001, guilloteaux & d?...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه - دانشکده ادبیات و علوم انسانی 1392

language learning courseware has been receiving growing attention by english educators since its advent. a variety of softwares have been designed by software designers and resorted to by language educators to supplement language textbooks. this experimental study investigated how the application of computerized version of language textbooks and the reception of the entire course through comput...

پایان نامه :0 1375

the significance of the study of deixis was then mentioned. the purpose of the present study from the outset was to provide a comprehensive overview of all kinds of deixis in persian, describing and defining each in true while considering them structurally and semantically. chapter two consisted of two main parts. a review of the english studies in this respect, besides presenting persian liter...

Journal: :CoRR 2017
Yingbo Hua Qiping Zhu Reza Sohrabi

This paper presents a number of fundamental properties of full-duplex radio for secure wireless communication under some simple and practical conditions. In particular, we consider the fields of secrecy capacity of a wireless channel between two single-antenna radios (Alice and Bob) against an unknown number of single-antenna eavesdroppers (Eves) from unknown locations, where Alice and Bob have...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید