نتایج جستجو برای: 4 good
تعداد نتایج: 1663607 فیلتر نتایج به سال:
We apply the Padé technique to find rational approximations to h±(q1, q2) = ∞ ∑ k=1 q 1 1± q 2 , 0 < q1, q2 < 1, q1 ∈ Q, q2 = 1/p2, p2 ∈ N \ {1}. A separate section is dedicated to the special case qi = q ri , ri ∈ N, q = 1/p, p ∈ N \ {1}. In this construction we make use of little q-Jacobi polynomials. Our rational approximations are good enough to prove the irrationality of h(q1, q2) and give...
We investigate the possibility to measure the spin content carried by the different quark flavors in a nucleon by means of polarized deep inelastic scattering with W exchange at HERA. Such measurements require a polarized proton beam. The expected inclusive and semi inclusive asymmetries are sizable and for realistic luminosities the expected statistical accuracies are good enough to extract ne...
Current sentiment analysis techniques are good enough when predicting the opinion of a community of individuals over one item, but they may produce wrong or inaccurate results when several possibly correlated items are under consideration. We propose to exploit and adapt formalisms, methods, and tools from knowledge representation and voting theory to generalize sentiment analysis and obtain an...
As an instance of complex networks, Internet has been a hot topic for both complex networks and traditional networks research fields. Internet Traveling Diameter (ITD) is an important property defined in this paper representing the dynamic flow of Internet performance, and was mainly discussed. Short-term forecast model of ITD was firstly studied, then after it was proved that the short-term on...
A peer-to-peer complementary currency can be a powerful tool for promoting exchanges and building relationships on the Internet. i-WAT [1] is a proposed such currency based on the WAT System [2], a polycentric complementary currency using WAT tickets as its media of exchange: participants spontaneously issue and circulate the tickets as needed, whose values are backed up by chains of trust. i-W...
This paper studies the performance of the clock transfer scheme for burst-mode communication systems for which data are received during short, equally spaced intervals. Its main focus is on satellite-based time-division multiple-access (TDMA) communication systems with data regeneration and switching onboard the satellite, although the results apply to other TDMA systems as well. The system ref...
Enhanced Pretty Good Privacy (EPGP) is a new cryptosystem based on Pretty Good Privacy (PGP), used for the purpose of secure e-mail message communication over an open network. The idea of EPGP, introduced in this paper, addresses PGP's main drawback of incomplete non-repudiation service, and therefore, attempts to increase the degree of security and efficiency of e-mail message communication.
A process for judging the alignment between curriculum standards and assessments developed by the author is presented. This process produces information on the relationship of standards and assessments on four alignment criteria: Categorical Concurrence, Depth of Knowledge Consistency, Range of Knowledge Correspondence, and Balance of Representation. Five issues are identified—but not resolved—...
This paper proposed a word usage classification for “De” in Chinese as a secondary language by rule induction algorithm. Learning of Chinese characters and tone adaption are both essential and hard tasks for non-native speakers. The frequent terms, defined in morphosyntatic particle “De” with three characters {的, 得, 地}, is hard to learn for foreign learners due to the similar pronunciation and ...
Abstract This introduction sets out the aims and scope of Special Issue provides an overview each research articles commentaries that follow.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید