نتایج جستجو برای: use a generality
تعداد نتایج: 13708145 فیلتر نتایج به سال:
Most information retrieval systems, including Web search engines, use similarity ranking algorithms based on a vector space model to find relevant information in response to a user’s request. However, the retrieved information is frequently irrelevant, because most of the current information systems employ index terms or other techniques that are variants of term frequency. In this paper, we pr...
What explains the truth of a universal generalization? Two types explanation can be distinguished. While an ‘instance-based explanation’ proceeds via some or all instances generalization, ‘generic is independent instances, relying instead on completely general facts about properties operations involved in generalization. This intuitive distinction analyzed by means truthmaker semantics, which a...
one of the important discussions in the science of principles of jurisprudence is generalization and restriction. implication of generality from proper nouns and sentences is through premises of wisdom. there are different viewpoints about generic nouns in terms of conventionality of their reference to generality or their being based . on premises of wisdom, like proper nouns and sentences. pre...
A simple, efficient, and high yielding one-pot protocol has been developed for the synthesis of 4H-benzo[b]pyrans scaffolds installing a three-component tandem Knoevenagel-cyclocondensation reaction of an aldehyde, malononitrile and dimedone using guanidinium chloride as polyfunctional organocatalyst under solvent-free conditions in high to excellent yields. Various aromatic aldehydes were util...
one of the most important goals for increasing recognition and treatment revenue is transmitting vital data to medical care team, more quickly. nowadays, use of new technologies for transmitting data will deploy more and more daily. in this article, for transmitting electrocardiogram, first we code the signal into a suite of codes, then we will use bluetooth technology to transmit data from off...
the present study investigated the effect of the two vocabulary teaching techniques in est, namely the use of translation and the use of visual aids as two separate vocabulary teaching techniques. to answer the question of the study, a pretest (michigan test) was administered to the 58 randomly selected est students at khajeh nasiredin tusi university, faculty of mechanics. after the homogeneit...
abstract the present study investigated the effects of task types and involvement load hypothesis on incidental learning of 10 target words (tws) in junior high schools (jhss) in givi, ardabil. the tasks deployed in this study were two input-based tasks (reading plus dictionary use with an involvement index of 3, and reading plus gap-fill task with an involvement index of 2), and one output-ba...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید