نتایج جستجو برای: tacitly support those actions that are called theft however
تعداد نتایج: 8280640 فیلتر نتایج به سال:
Ensemble-Learning-Based Decision Support System for Energy-Theft Detection in Smart-Grid Environment
Theft of electricity poses a significant risk to the public and is most costly non-technical loss for an electrical supplier. In addition affecting quality energy supply strain on power grid, fraudulent use drives up prices honest customers creates ripple effect economy. Using data-analysis tools, smart grids may drastically reduce this waste. Smart-grid technology produces much information, in...
for the first time nakayama introduced qf-ring. in 1967 carl. faith and elbert a. walker showed that r is qf-ring if and only if each injective right r-module is projective if and only if each injective left r-modules is projective. in 1987 s.k.jain and s.r.lopez-permouth proved that every ring homomorphic images of r has the property that each cyclic s-module is essentialy embeddable in dire...
wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...
Identity theft is often perceived as one of the major upcoming threats in crime. However, there is no commonly accepted definition of ‘identity theft’ or ‘identity fraud’, and it is impossible to study the real threat of this phenomenon without conceptual clarity. In this article, we attempt to provide a starting point for policy and research by proposing some definitions. We indicate that what...
We study the interplay among imperfect memory, limited commitment, and theft, in an environment that can support monetary exchange and credit. Imperfect memory makes money useful, but it also permits theft to go undetected, and therefore provides lucrative opportunities for thieves. Limited commitment constrains credit arrangements, and the constraints tend to tighten with imperfect memory, as ...
A response is given to criticisms in a recent paper of the validity of the amphipod suborder Senticaudata. The tacitly assumed status of truth implied in some molecular higher phylogenies is called in to question.
a major concern in the last few years has been the fact that the cultural centers are keeping distance with what they have been established for and instead of reproducing the hegemony, they have turned into a place for resistance and reproduction of resistance against hegemony. because the cultural centers, as urban public spaces in the last two decades, have been the subject of ideological dis...
The responsibility of the vehicle operators stolen or usurped motor vehicles and way to eliminate this are shown in first paragraph article 107 Highway Traffic Law No: 2918. According aforementioned paragraph, can escape liability pay compensation by proving that they persons for whose actions responsible have no misbehaviors related theft usurpation vehicles. In study, correlation between exam...
Verbs have two separate levels of meaning. One level reflects the uniqueness of every verb and is called the "root". The other level consists of a more austere representation that is shared by all the verbs in a given class and is called the "event structure template". We explore the following hypotheses about how, with specific reference to the motor features of action verbs, these two distinc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید