نتایج جستجو برای: way and one

تعداد نتایج: 16935922  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1390

the present research study attempted to find out the extent to which two pre-task activities of “glossary of unknown vocabulary items” and “content related support” assisted efl language learners with their performance on listening comprehension questions across two different proficiency levels (low and high). data for this study were obtained from a total of 120 language learners, female and m...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم پایه 1391

bekenstein and hawking by introducing temperature and every black hole has entropy and using the first law of thermodynamic for black holes showed that this entropy changes with the event horizon surface. bekenstein and hawking entropy equation is valid for the black holes obeying einstein general relativity theory. however, from one side einstein relativity in some cases fails to explain expe...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده علوم تربیتی و روانشناسی 1391

abstract: research purpose: the purpose of this research is to identify academic databases assessment factors and criteria at law and political science majors. the necessity of this research is to distinguish academic databases assessment factors and criteria and to identify the most important ones and rank them in order to select an appropriate database according to students’ and faculty memb...

2005
Vincent Danos Elham Kashefi Prakash Panangaden

We present a comprehensive and universal quantum computing model based on 2-qubit measurements (TQC), which embeds trivially in a model based on 1-qubit measurements known as the one-way model (1WQC). One inherits through this embedding a calculus whereby each TQC computing pattern can be put in a standard form where entanglement is done first, then measurement, then local corrections.

2008
Kan Yasuda

Many of the popular Merkle-Damg̊ard hash functions have turned out to be not collision-resistant (CR). The problem is that we no longer know if these hash functions are even second-preimage-resistant (SPR) or one-way (OW), without the underlying compression functions being CR. We remedy this situation by introducing the “split padding” into a current Merkle-Damg̊ard hash function H. The patched h...

2004
Frédéric Muller

MD2 is an early hash function developed by Ron Rivest for RSA Security, that produces message digests of 128 bits. In this paper, we show that MD2 does not reach the ideal security level of 2. We describe preimage attacks against the underlying compression function, the best of which has complexity of 2. As a result, the full MD2 hash can be attacked in preimage with complexity of 2.

Journal: :International Journal of Workplace Health Management 2019

Journal: :Science 2010

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1390

abstract birbery and corruption and other criminal and as such is one of social phenomena , and i can firmly say that society is protected and safe from harm , this is criminal . eache community is familiar with these crimes and the crime associated ( direct or indirect ) with the political economic , social , and cultural beliefs and religious issues , especially with the community . admitted...

2012
Davide Caimmi Alessia Marseglia Giovanni Pieri Serena Benzo Luca Bosa Silvia Caimmi

It's well established that asthma, allergic rhinitis and rhinosinusitis are three closely related disease. In pediatrics, these conditions represent a common issue in daily practice. The scientific community has recently started to simply evaluate them as different manifestations of a common pathogenic phenomenon. This consideration relates to important implications in the clinical management o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید