نتایج جستجو برای: without any information coll algorithm

تعداد نتایج: 2868747  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تهران 1376

‏‎‏‎utopia has, for four centuries, accompanied that hope of progress and that striving for betterment. it now straggles against a widespread sense that this has been an illusion, or an impossible dream. the utopian idea can never entirely disappear, but utopia as a form of the social imagination has clearly weakened. if it cannot instill its vision in the public consciousness, the consequences...

2011
Scott Bateman Carl Gutwin Gordon McCalla Ryen W. White

When searching for information, people often seek help from others. However, while people can benefit from communicating with others, they can usually satisfy their information needs, to some degree, without help. Because establishing explicit collaborations is often seen as onerous, there are many missed opportunities where shared experiences could save time and effort. In this work, we propos...

Abstract: A combination of a finite element method (FEM) algorithm with ANSYS codes and post image processing of NDT ultrasonic images along with laboratory cooling experiments and microstructural analysis provide a guideline to determine the optimum cooling rate for any grade of steel in which the highest productivity can be achieved without any degradation of the cast steel products. The sugg...

2008
Daisuke Kawahara Sadao Kurohashi

The use of similarities has been one of the main approaches to resolve the ambiguities of coordinate structures. In this paper, we present an alternative method for coordination disambiguation, which does not use similarities. Our hypothesis is that coordinate structures are supported by surrounding dependency relations, and that such dependency relations rather yield similarity between conjunc...

2009
PETER HEGARTY

Let A be a basis for N0 of some order. By an essentiality of A one means a subset P such that A\P is no longer a basis (of any order) and such that P is minimal among all subsets of A with this property. In a recent paper, Deschamps and Farhi asked whether every basis of N0 possesses some such subset. We construct, for every integer h ≥ 2, a basis of order h with no essentialities.

2009
Shafi Goldwasser

The absolute privacy of the secret-keys associated with cryptographic algorithms has been the corner-stone of modern cryptography. Still, in practice, keys do get compromised at times for a variety or reasons. A particularly disturbing loss of secrecy is as a result of side channel attacks. These attacks exploit the fact that every cryptographic algorithm is ultimately implemented on a physical...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم انسانی 1390

abstract al- muntazam by ibn al -jawzi is one of the greatest the book ancient book of texts on history of islam in the 6th century.it is very important one;because of including rare reports which are not found any where.in addition to historical reports,his outlook , in which embodies information on mythologies, milal wa nihal (sects and creeds), geography, and political, social and religiou...

Data mining is an appropriate way to discover information and hidden patterns in large amounts of data, where the hidden patterns cannot be easily discovered in normal ways. One of the most interesting applications of data mining is the discovery of diseases and disease patterns through investigating patients' records. Early diagnosis of diabetes can reduce the effects of this devastating disea...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید