نتایج جستجو برای: hasan al
تعداد نتایج: 444326 فیلتر نتایج به سال:
With the development of IP networks and intelligent optical switch networks, the backbone network tends to be a multi-granularity transport one. In a multi-granularity transport network (MTN), due to the rapid growth of various applications, the scale and complexity of network devices are significantly enhanced. Meanwhile, to deal with bursty IP traffic, the network devices need to provide cont...
1. Pareek A, Khopkar U, Sacchidanand S, Chandurkar N, Naik GS. Comparative study of efficacy and safety of hydroxychloroquine and chloroquine in polymorphic light eruption: A randomized, double-blind, multicentric study. Indian J Dermatol Venereol Leprol 2008;74:18-22. 2. Nyberg F, Hasan T, Puska P, Stephansson E, Häkkinen M, Ranki A, et al. Occurrence of polymorphous light eruption in lupus er...
We describe light-reflection properties of spherically curved mirrors, like balls in the Christmas tree. In particular, we study the position of the image which is formed somewhere beyond the surface of a spherical mirror, when an eye observes the image of a pointlike light source. The considered problem, originally posed by Abu Ali Hasan Ibn al-Haitham — alias Alhazen — more than a millennium ...
Online debate forums present a valuable opportunity for the understanding and modeling of dialogue. To understand these debates, a key challenge is inferring the stances of the participants, all of which are interrelated and dependent. While collectively modeling users’ stances has been shown to be effective (Walker et al., 2012c; Hasan and Ng, 2013), there are many modeling decisions whose ram...
We present a methodology to analyze the linguistic evolution of scientific registers with data mining techniques, comparing the insights gained from shallow vs. linguistic features. The focus is on selected scientific disciplines at the boundaries to computer science (computational linguistics, bioinformatics, digital construction, microelectronics). The data basis is the English Scientific Tex...
Hasan M. Al-Refai [email protected] [email protected] Mobile Phone #: 00962-777357755 Abstract Bisimulation as a technique could be well invested for proving authenticity and secrecy properties of cryptographic protocols to gain the legality of protocol optimization. In this paper, we will do some changes in the spi-calculus after the original work of M.Abadi and A.Gordon. Then...
Glitches due to the secondary neutron particles from cosmic rays cause soft errors in integrated circuits (IC) that are becoming a major threat in modern sub 45nm ICs. Therefore, researchers have developed many techniques to mitigate the soft errors and some of them utilize the built in error detection schemes of low-power asynchronous null conventional logic (NCL). However, it requires extensi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید