نتایج جستجو برای: static characters

تعداد نتایج: 151389  

پایان نامه :موسسه آموزش عالی غیر دولتی و غیرانتفاعی علامه محدث نوری (ره) - پژوهشکده اقتصاد 1393

dynamic assessment according to vygotskys sociocultural theory, states that instruction and assessment are interrelated. using static forms of assessment with second and foreign language students could do more harm than good. many teachers neglect to take account of the complexity involved in learning a second or foreign language and often wonder why learning of a language take so long. thi...

Journal: :Electronic Publishing 1993
Clyde D. McQueen Raymond G. Beausoleil

We have developed a high-performance parametric font generation system for the creation and commercial supply of digital fonts, and in particular, for generating a wide variety of digital typefaces using a single compact representation of typographic knowledge and characteristics. Typographic feature detail can be added or removed, depending on the application. The system does not rely on maste...

2005
Han-Vit Chung In-Kwon Lee

We present a new method for deforming an object in a static real scene, which interacts with animated synthetic characters. Unlike the existing method making a new synthetic object to substitute for the interacting object in the real scene, we directly deform the object in image space using an image-warping technique with assistance from a simplified 3D sub-model. The deformed image sequence is...

2013
Jianmin Pang Yichi Zhang Chao Dai Qiang Wang

In order to avoid being static analyzed, hacker rely on various obfuscation techniques to hide its malicious characters. These techniques are very effective against common disassembles, preventing binary file from being disassembled correctly. The study presents novel disassemble algorithm which based on analyzed Control Flow Graph (CFG) and Data Flow Graph (DFG) information improve the ability...

Journal: :Applied sciences 2023

Studying password-cracking techniques is essential in the information security discipline as it highlights vulnerability of weak passwords and need for stronger measures to protect sensitive information. While both methods aim uncover passwords, approach task different ways. A brute force algorithm generates all possible combinations characters a specified range length, while dictionary attack ...

Journal: :Offset 1969

2017
Arnab Ganguly Rahul Shah Sharma V. Thankachan

The fields of succinct data structures and compressed text indexing have seen quite a bit of progress over the last two decades. An important achievement, primarily using techniques based on the Burrows-Wheeler Transform (BWT), was obtaining the full functionality of the suffix tree in the optimal number of bits. A crucial property that allows the use of BWT for designing compressed indexes is ...

1997
Li Guo

Let E be an elliptic curve over Q with complex multiplication by the ring of integers of an imaginary quadratic eld. Let be the Hecke character associated to E by the theory of complex multiplication. Let be the complex conjugate character of. For a pair of integers k and j, deene the Hecke character ' = '(k; j) = k j. Let p be a prime where E has good, ordinary reduction. Let p be a xed prime ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه - دانشکده فنی 1393

ناکاملی هندسی در ستون ها از مواردی می باشد که وجود آن در اعضای سازه ای را نمی توان نادیده گرفت، در هر عضو سازه ای ناکاملی هندسی هر چند بسیار کوچک وجود خواهد داشت از این رو بررسی تاثیرات این ناکاملی ها و همچنین پیدا کردن مقدار مجاز برای آنها در طراحی سازه های فولادی دارای اهمیت خاصی می باشد. هدف این پژوهش بررسی رفتار قاب های فولادی با ناکاملی در مختصات گرهی به میزان 3، 6 و 9 میلی متر بوده که برا...

Journal: :bulletin of the iranian mathematical society 2011
a. heydari b. taeri

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید