نتایج جستجو برای: mentioned question has also been answered

تعداد نتایج: 4785194  

Journal: :Educational Technology & Society 2015
Anna Helga Jonsdottir Audbjorg Jakobsdottir Gunnar Stefansson

This paper describes a system for research on the behaviour of students taking online drills. The system is accessible and free to use for anyone with web access. Based on open source software, the teaching material is licensed under a Creative Commons License. The system has been used for computer-assisted education in statistics, mathematics and fishery science. It offers a unique way to stru...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :Frontiers in Genetics 2015

Journal: :Environmental Research Letters 2017

Journal: :JACC: Clinical Electrophysiology 2019

Journal: :International Journal of Systematic and Evolutionary Microbiology 2014

Journal: :The American Journal of Medicine 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید