نتایج جستجو برای: agreement system

تعداد نتایج: 2360742  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم پایه 1391

a simple, rapid and low-cost scanner spectroscopy method for the glucose determination by utilizing glucose oxidase and cdte/tga quantum dots as chromoionophore has been described. the detection was based on the combination of the glucose enzymatic reaction and the quenching effect of h2o2 on the cdte quantum dots (qds) photoluminescence.in this study glucose was determined by utilizing glucose...

Introduction: It is recommended that the physician apply at least a semi-quantitative segmental scoring system in myocardial perfusion SPECT.  We aimed to assess the agreement between automated semi-quantitative analysis using QPS (quantitative Perfusion SPECT) software and visual approach for calculation of summed stress  score (SSS), summed rest score (SRS) and summed difference score (SDS). ...

Journal: :حقوق خصوصی 0
عبدالحسین شیروی استاد گروه حقوق، دانشکدة حقوق، پردیس فارابی دانشگاه تهران، ایران محمد رضا پنداشته پور دانشجوی دکتری حقوق خصوصی، پردیس فارابی دانشگاه تهران، ایران.

these days globalization especially in the capital and property parts has impressed all fields of the law. moving towards private contract in overseas relations and adjusting the volume of standard contracts in relationships maybe largely elapsed the field of international private law. but the truth is that regardless of the main lines of this field of law achieving an agreement which is coveri...

2003
Kathryn Bock

Plainly, this judgment was prompted by the absence of agreement between the question's subject and verb. Efforts i s plural and 'requires the plural are, not the singular is. Belying its reputation as an effete detail, agreement i s a paradigm case ofwhat syntax does. Fundamentally, syntax ties together words that rep resent elements of nonlinguistic thought. The following example illustrates h...

2009
Manuel Barbosa Pooya Farshim

We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this technique to two of the most popular models adopted in literature (Bellare-Rogaway and Canetti-Krawczyk). We analyse previous results obtained using these models in light of the proposed extensions, and demonstrate the...

2016
Gorica Tapandjieva Gil Regev Alain Wegmann

We present our experience of a three-week fieldwork in the form of a contextual inquiry with a service manager at the EPFL IT department. During these three weeks, we encounter a refusal of a user committee to sign a servicelevel agreement (SLA). We describe the context in which this refusal occurs, and we uncover our findings about the core of ITIL’s service-level management that building rela...

2007
Guilin Wang

Here, A and B are the identities of the two communicating parties, Alice and Bob. EncPKB (·) is the public key encryption algorithm with respect to Bob’s public key PKB, while EK(·) denotes a symmetric encryption algorithm associated with a session key K. After receiving the expected information from Alice, Bob first decrypts EncPKB (K) to get the session key K using his private key SKB, and th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید