نتایج جستجو برای: this method is fast
تعداد نتایج: 8957614 فیلتر نتایج به سال:
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
به طور کلی در فرآیندهای مارکوف ارگودیک دو بعدی یافتن فرم بسته توزیع ایستا، تنها برای حالات خیلی خاص امکان پذیر است. با توجه به این مشکل و نیز با توجه به اهمیت توزیع ایستا، بررسی و مطالعه رفتار مجانبی توزیع ایستای این فرآیندها مورد توجه قرار گرفته است. زنجیر قدم زدن تصادفی دو بعدی که در برخی متون به آن، فرآیند qbd دو طرفه نیز می گویند، یکی از این فرآیندها است. یک فرآیند qbd زمان گسسته یک زنجیر م...
due to the limiting workspace of parallel manipulator and regarding to finding the trajectory planning of singularity free at workspace is difficult, so finding a best solution that can develop a technique to determine the singularity-free zones in the workspace of parallel manipulators is highly important. in this thesis a simple and new technique are presented to determine the maximal singula...
there is less published research about how teachers in efl contexts respond to students who are relatively less mature and less competent l2 writers. while writing researchers have examined various issues concerning peer and teacher response in writing-oriented classes, little research has centered on the effect of collaborative tasks particularly dictogloss on writing skills. output collaborat...
in chapter 1, charactrizations of fragmentability, which are obtained by namioka (37), ribarska (45) and kenderov-moors (32), are given. also the connection between fragmentability and its variants and other topics in banach spaces such as analytic space, the radone-nikodym property, differentiability of convex functions, kadec renorming are discussed. in chapter 2, we use game characterization...
the purpose of this study was the relationship between problem – solvi ability with fdi cognitive style of students.the research method was correlation method. for data analysis pearson test was used. statistical society in this research was all the students of alligoodarz city in 1391-92 year.to sampling of statiscal population was used sampling multi-stage random the size of sample selected 2...
abstract following innovations in the field of elt, a new topic which has recently attracted a lot of attention is metaphor analysis. although this area of research is still in its infancy in elt, it seems that the idea can shed more light on the puzzle of english language learning and teaching. therefore, the major aim of this study is to analyze language learning and teaching in formal a...
abstract in this thesis at first we comput the determinant of hankel matrix with enteries a_k (x)=?_(m=0)^k??((2k+2-m)¦(k-m)) x^m ? by using a new operator, ? and by writing and solving differential equation of order two at points x=2 and x=-2 . also we show that this determinant under k-binomial transformation is invariant.
this study investigates the problem of translating religious allusions in persian literature, namely the ones borrowed from quranic verses and hadiths. the purpose of this study is to shed light on how different translators dealt with such a task and also to provide guidelines for translators in coping with religious allusions.
introruction khawf in(iran)-herat and mazaresharif and shirkhan bandar in (afghanistan)-dushanbe in (tajikistan)_(kirgizstan)-kashghar in(china) project railway network is under construction that it is as a significant corridor for revitalizing silk road corridor in the region .at the present there are three different gauge in the region central asia with 1,520 mm gauge and turkey-islamic repu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید