نتایج جستجو برای: ident
تعداد نتایج: 404 فیلتر نتایج به سال:
پژوهش حاضر به توصیف و تحلیل بازنمایی واج /r/ در گویش ترکی عجبشیری در محیطهای واجی مختلف در چارچوب نظریة بهینگی میپردازد. نظریۀ بهینگی، در قالب تعامل محدودیتهای نشانداری و پایایی، به توجیه فرایندهای واجی میپردازد. دادههای این پژوهش، از گویشوران بومی مسن و بیسواد عجبشیر جمعآوری شده است. لازم به ذکر است در این گویش، واج /r/ در هیچ محیط واجی تظاهر آوایی ندارد و همواره یا به واج /j/ تبدیل م...
The formation and turnover of soil organic carbon (C), the largest terrestrial C pool, is strongly impacted by ultimate source that C: leaves, wood, roots, root exudates. quantity quality these inputs determined identity plants involved. Yet substantial uncertainty surrounds complex relationships among plant traits C, precluding efforts to maximize whole-ecosystem uptake in nature-based climate...
In identification protocols with public verifier coins (like Fiat-Shamir), a passive adversary watching the communication gains information intended only for the verifier. On the other hand, private coin protocols with fewer than three rounds cannot be zero-knowledge. In this paper, we introduce the notion of bounded-prover zero-knowledge proofs which require only two rounds and can be consider...
Amongst provably secure signature schemes, two distinct classes are of particular interest: the ones with tight reduction (e.g., RSA-PSS), and those which support the use of coupons (e.g., Schnorr signature). This paper introduces a new generic signature scheme based on any zero-knowledge identification protocol Z and signature scheme S verifying basic security properties. The so-obtained signa...
Zero-knowledge proofs were introduced by Goldwasser, Micali, and Rackoff. A zero-knowledge proof allows a prover to demonstrate knowledge of some information, for example that they know an element which is a member of a list or which is not a member of a list, without disclosing any further information about that element. Existing constructions of zero-knowledge proofs which can be applied to a...
Oblivious transfer is a powerful cryptographic primitive that is complete for secure multi-party computation. In oblivious transfer protocols a user sends one or more messages to a receiver, while the sender remains oblivious as to which messages have been received. Protocols for oblivious transfer cannot exist in a classical or fully-quantum world, but can be implemented by restricting the use...
Human identity is not a self-contained entity, hidden in the depths of our inner self, but is actively constructed in a social world with the aid of various expressions, such as social roles, rituals, clothes, music, and (life) stories. These expressions not only mediate between us and our world (referentiality) and between us and our fellow man (communicability), but also between us and oursel...
یکی از گرایش های عام در میان زبان های دنیا، اجتناب از برخورد واکه ها در سطح آوایی، پس از ساخت صورت زیربنایی واژه در بخش صرف است. یکی از راهکارهای رفع التقای واکه ها، تبدیل واکة دوم به غلت است. در این مقاله، سعی بر آن است تا با ارائة تحلیلی در قالب رویکرد تسلسل گرایی هماهنگ[1] (hs) در نظریة بهینگی، نمونه ای در کردی کلهری مورد بررسی قرار گیرد و در آن مفاهیم اصلی در بهینگی، همچون تسلط، تعارض...
Sheet and film processes pose a challenging identification and control problem due to high complexity, poor conditioning, and limited input output data. The interaction between model accuracy and closed-loop performance is explored for sheet and film processes using a model decomposition in terms of two static orthogonal matrices in series with a diagonal transfer--function matrix. It is shown ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید