نتایج جستجو برای: asides
تعداد نتایج: 143 فیلتر نتایج به سال:
Exchange $\mu-\tau$ symmetry in the effective Majorana neutrino mass matrix does predict a maximal mixing for atmospheric oscillations asides to null that cannot be straightforwardly identified with reactor oscillation mixing, $\theta_{13}$, unless specific ordering is assumed eigenstates. Otherwise, non zero value $\theta_{13}$ predicted already at level of an exact symmetry. In this case, sol...
Editors’ Abstract During the 1992–1993 academic year, Harold Garfinkel (1917–2011) offered a graduate seminar on Ethnomethodology in Sociology Department at University of California, Los Angeles. One topic that was given extensive coverage has not been discussed much length Garfinkel’s published works to date: Aron Gurwitsch’s treatment Gestalt theory, and particularly themes “phenomenal field”...
Human performance, in all its di erent dimensions, is a very complex and interesting topic. In this paper we focus on performance in the workplace which, asides from complex is often controversial. While organizations and generally competitive working conditions push workers into increasing performance demands, this does not necessarily correlates positively to productivity. Moreover, existing ...
The phenomenon of producing surrogate mother facilities has been recognized in some countries, although Indonesia indirectly prohibits the practice. practice is also feared to be a new form human trafficking. Therefore, this study aims evaluate opportunities for surrogacy legalization regarding its perspectives between rights and loophole In study, three problems were formulated: (1) legal stat...
Binary Search Trees are a frequently used data structure for rapid access to the stored data. Data structures like arrays, vectors and linked lists are limited by the trade-off between the ability to perform a fast search and resize easily. They are an alternative that is both dynamic in size and easily searchable. Due to efficiency reason, complete and nearly complete binary search trees are o...
This paper argues that despite a growing body of scholarly literature on Sir James Steuart, his theory of history and influence on Marxian political economy has been largely ignored. The approach of this paper is motivated, in part, by Marx’s sympathetic treatment of Steuart found in the opening of his Theories of Surplus Value, and in scattered asides throughout the remainder of his work. We a...
There exists a variety of techniques for the computational complexity analysis of algorithms and functions. This analysis is foundational to the algorithmic and the functional performance. Asides from the big-oh complexity, there are other complexity notations, such as Ω, Θ, small o and small ω notational complexities. Complexity analysis is used to select an appropriate algorithm for solving a...
These notes are an expanded version of a short course of lectures given for graduate students in particle physics at Oxford. The level was intended to be appropriate for students in both experimental and theoretical particle physics. The purpose is to present an elementary and self-contained introduction to SUSY that follows on, relatively straightforwardly, from graduate-level courses in relat...
When handling a security incident, there is lot of information that needs to be stored, processed, and analyzed. As result the volume necessity deal with incident investigation promptly, different forensic tools have been developed provide cyber threat intelligence response management platforms solutions. These enable responders effectively collaborate in identifying investigating incidents, ma...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید