نتایج جستجو برای: bogus metric
تعداد نتایج: 82175 فیلتر نتایج به سال:
in this paper, we propose a new definition of intuitionistic fuzzyquasi-metric and pseudo-metric spaces based on intuitionistic fuzzy points. weprove some properties of intuitionistic fuzzy quasi- metric and pseudo-metricspaces, and show that every intuitionistic fuzzy pseudo-metric space is intuitionisticfuzzy regular and intuitionistic fuzzy completely normal and henceintuitionistic fuzzy nor...
The article is a book review on “Ethnography of Bogus. Who and how writes customized academic essays in Russia” by A. Davydov P. Abramov (Moscow: Khamovniki Foundation for Social Research: Common Place, 2021, 176 p.). This describes the practices contract cheating Russian higher education as an established social institution involving undergraduate graduate students. Bogus” presents faculty sta...
Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants’ collusion. We propose a cheating model for the secret sharing schemes based on linear memor...
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detecting the in-field compromised nodes, which may collect sufficient number of keyed message authentication codes (MAC). An in-field attack proof mechanism is presented in this paper. The MAC delivery mechanism makes the...
Peer-to-peer streaming has witnessed a great success, thanks to the possibility of aggregating resources from all participants. However, performance of the entire system may be highly degraded due to the presence of malicious peers that share bogus data on purpose. In a peer-to-peer (P2P) streaming system, since each peer needs to participate in uploading data to other peers, malicious peers ma...
Werner Sichel Public Lecture on the Economics of Risk, presented at Western Michigan University on November 7, 2001 and co-sponsored by the W. E. Upjohn Institute for Employment Research. I would like to thank Ted Groves, Donald Meyer and Joel Sobel for helpful comments. This material is based upon work supported by the National Science Foundation under Grant No. 9870894. All opinions and error...
We investigate the Treasury bill (T-bill) market for volatility effects, and especially any volatility introduced by the T-bill auction process. We use daily T-bill yields for on-therun 13-, 26-, and 52-week T-bills from January 1983 through December 2000. We find that T-bill volatility is not constant across a run, hence is not consistent with the Treasury's auction process intent of a stable ...
When I first started doing research in the area of college and university teaching about 35 years ago, it was like being a voice in the wilderness. But I discovered two other voices in the same wilderness doing the same type of research, namely Chris Knapper and Bill McKeachie. I have benefited greatly from my contacts with both of them over the years, and I have also been lucky enough to have ...
The relationship between bill morphology and preening behaviour was studied in 11 species of waders. On the assumption that species with long bills might be less efficient at preening than birds with short bills, the hypothesis was tested that long-billed species devoted more time to preening than short-billed species. Results showed a positive relationship between bill length and time spent pr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید