نتایج جستجو برای: k sorani has a suffix called

تعداد نتایج: 13654404  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم پایه 1391

a simple, rapid and low-cost scanner spectroscopy method for the glucose determination by utilizing glucose oxidase and cdte/tga quantum dots as chromoionophore has been described. the detection was based on the combination of the glucose enzymatic reaction and the quenching effect of h2o2 on the cdte quantum dots (qds) photoluminescence.in this study glucose was determined by utilizing glucose...

2006
Fei Nan Don Adjeroh

The suffix tree is a data structure that has found applications in various important problems, such as genetic sequencing, pattern matching and computational biology. Its derivative data structure, the suffix array, is another representation with the added advantage of a small memory footprint. We propose a simple O(n log n) time divideand-conquer sort-and-merge algorithm for solving the suffix...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشکده اصول الدین 1389

چکیده «محکم و متشابه»، «نسخ» و «قرائات» از موضوعات مهم علوم قرآنی است. آیت الله معرفت در هر سه موضوع ضمن نقد دیدگاههای گذشته و رایج، به ارائه نظریاتی بدیع پرداخته اند. تعریف روشن از محکم و متشابه، تفاوت بین متشابه و مبهم، طبقه بندی تشابه به ذاتی و عرضی و ضابطه مند ساختن معانی تأویلی و باطنی، از جمله نوآوری های آیت الله معرفت در حوزه محکم و متشابه به شمار می رود. در موضوع نسخ، شاهد دو قرائت...

2013
P. P. Shelke A. S. Alvi

Clustering is related to data mining for information retrieval. Relevant information is retrieved quickly while doing the clustering of documents. It organizes the documents into groups; each group contains the documents of similar type content. Different clustering algorithms are used for clustering the documents such as partitioned clustering (K-means Clustering) and Hierarchical Clustering (...

2015
Emily Shen

In this paper, we consider a setting where aclient wants to outsource storage of a large amount ofprivate data and then perform substring search querieson the data – given a data string s and a search stringp, find all occurrences of p as a substring of s. First, weformalize an encryption paradigm that we call queryableencryption, which generalizes searchable symmetric e...

Journal: :Computer Networks 2006
Hua-Fu Li Suh-Yin Lee Man-Kwan Shan

Mining Web click streams is an important data mining problem with broad applications. However, it is also a difficult problem since the streaming data possess some interesting characteristics, such as unknown or unbounded length, possibly a very fast arrival rate, inability to backtrack over previously arrived click-sequences, and a lack of system control over the order in which the data arrive...

A GOODARZI, H YOUSEFI-AZARI,

A tree T of order n is called k-placement if there are k edge-disjoint copies of T into K_{n}. In this paper we prove some results about 4-placement of rooted trees.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

a one dimensional dynamic model for a riser reactor in a fluidized bed catalytic cracking unit (fccu) for gasoil feed has been developed in two distinct conditions, one for industrial fccu and another for fccu using various frequencies of microwave energy spaced at the height of the riser reactor (fccu-mw). in addition, in order to increase the accuracy of component and bulk diffusion, instanta...

2013
Kyumars Sheykh Esmaili Shahin Salavati

Resource scarcity along with diversity– both in dialect and script–are the two primary challenges in Kurdish language processing. In this paper we aim at addressing these two problems by (i) building a text corpus for Sorani and Kurmanji, the two main dialects of Kurdish, and (ii) highlighting some of the orthographic, phonological, and morphological differences between these two dialects from ...

2015
Emily Shen

In this paper, we consider a setting where aclient wants to outsource storage of a large amount ofprivate data and then perform substring search querieson the data – given a data string s and a search stringp, find all occurrences of p as a substring of s. First, weformalize an encryption paradigm that we call queryableencryption, which generalizes searchable symmetric e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید