نتایج جستجو برای: known authors

تعداد نتایج: 935048  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1382

‏‎in this research,the authors conducted a study comparing two groups of male and female english language learners studying in a elt institute,in terms of their performance on their achievement test including listening comprehension,vocabulary,grammar,and reading comprehension and found no significant difference between the group except in listening comprehension part of the test in which the f...

Journal: :Informatica, Lith. Acad. Sci. 2000
Min-Shiang Hwang

This paper discusses a known-plaintext attack on a redundancy reducing cipher method which is proposed by Wayner. We also propose an extension of Wayner’s redundancy reducing cipher scheme so that the security will be improved greatly.

2014
Karin Hemmann

.................................................................................................... 4 CONTENTS ..................................................................................................... 5 LIST OF ORIGINAL PUBLICATIONS ........................................................... 7 ABBREVIATIONS ..............................................................................

Journal: :archives of medical laboratory sciences 0
dr. hoorie soleimanjahi tarbiat modares university, tehran

0

Journal: :iranian journal of medical sciences 0
sayed mohammad reza hadavi anesthesiology and critical care research center, department of anesthesiology, faghihi hospital, shiraz university of medical sciences, shiraz, iran elaheh allahyary anesthesiology and critical care research center, department of anesthesiology, faghihi hospital, shiraz university of medical sciences, shiraz, iran saman asadi anesthesiology and critical care research center, department of anesthesiology, faghihi hospital, shiraz university of medical sciences, shiraz, iran

0

Journal: :nursing and midwifery studies 0

1992
Keith W. Campbell Michael J. Wiener

We prove that the set of DES permutations (encryption and decryption for each DES key) is not closed under functional composition. This implies that, in general, multiple DES-encryption is not equivalent to single DES-encryption, and that DES is not susceptible to a particular known-plaintext attack which requires, on average, 228 steps. We also show that the size of the subgroup generated by t...

2012
Gwen Dewar

As noted below, most researchers agree that young babies should sleep in the same room where their parents sleep. The point of disagreement is whether parents should be advised against sharing their beds. Some researchers think that the safest arrangement involves cosleeping without sharing the same bed—-i.e., placing a young infant in a crib or “side car” that is within arm’s reach of his parent.

2002
Graham Kendall Stephen Shaw

Cribbage is (normally) a two-player card game where the aim is to score 121 points before your opponent. The game has four stages, one of which involves discarding two cards from the six cards you are dealt. A later stage scores the four cards in your hand together with a card cut randomly from the deck after the discards have been made. The two cards that were discarded are used to form anothe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید