نتایج جستجو برای: ) by the shao scheme

تعداد نتایج: 17022817  

Journal: :فیزیک زمین و فضا 0
لیدا خسروسرشکی دانش آموختة کارشناسی ارشد، گروه فیزیک فضا، مؤسسه ژئوفیزیک دانشگاه تهران، ایران پرویز ایران نژاد دانشیار، گروه فیزیک فضا، مؤسسه ژئوفیزیک دانشگاه تهران، ایران عباسعلی علی اکبری بیدختی استاد، گروه فیزیک فضا، مؤسسه ژئوفیزیک دانشگاه تهران، ایران

the first step in studying dust events is the estimation of dust emission from sources. in this study, the simulations of the vertical dust flux (vdf) over iran by the mba (marticorena, bergametti, and alfaro) and shao schemes are compared. the mba scheme is energy-based and derived on the basis of energy balance between the kinetic energy of saltating particles and binding energy of the surfac...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی خواجه نصیرالدین طوسی - دانشکده برق و کامپیوتر 1391

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی 1390

iv abstract this study examined the linguistic behaviors of two iranian efl teachers each of them teaching learners of two similar proficiency levels, a beginner level and an intermediate level, to investigate the relationship between the learners proficiency levels and the amounts and purposes for l1 use by the two teachers. the study was carried out to investigate whether there were differe...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده ادبیات و علوم انسانی 1391

nowadays enhancing critical thinking in learners is considered one of the foreign language teachers’ tasks due to its high position in foreign language classrooms. when it comes to selecting materials for language classrooms, there are obviously some criteria that teachers should apply. the present study aimed at a critical thinking based analysis of ten picture story books and ten folktales th...

‎In a (t,n)-threshold secret sharing scheme‎, ‎a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together‎, ‎but no group of fewer than t participants can do‎. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao‎, ‎and the intractability of the elliptic curve discrete logar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1382

‏‎the main purpose of this research was to:1.develop a coking model for thermal cracking of naphtha.2.study coke inhibition methods using different coke inhibitors.developing a coking model in naphtha cracking reactors requires a suitable model of the thermal cracking reactor based on a reliable kinetic model.to obtain reliable results all these models shall be solved simultaneously.for this pu...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - پژوهشکده علوم انسانی و اجتماعی 1391

the central purpose of this study was to conduct a case study about the role of self monitoring in teacher’s use of motivational strategies. furthermore it focused on how these strategies affected students’ motivational behavior. although many studies have been done to investigate teachers’ motivational strategies use (cheng & d?rnyei, 2007; d?rnyei & csizer, 1998; green, 2001, guilloteaux & d?...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه امام رضا علیه السلام - دانشکده ادبیات و علوم انسانی 1392

the present study aims at identifying, classifying and analyzing collocation errors made by translators of the holy quran into english.findings indicated that collocationally the most acceptablt translation was done by ivring but the least appropriate one made by pickthall.

Journal: :IACR Cryptology ePrint Archive 2009
Min-Rong Chen Xi Zhang Xia Li

In Eurocrypt’98, Blaze, Bleumer and Strauss [4] introduced a primitive named proxy reencryption (PRE), in which a semi-trusted proxy can convert without seeing the plaintext a ciphertext originally intended for Alice into an encryption of the same message intended for Bob. PRE systems can be categorized into bidirectional PRE, in which the proxy can transform from Alice to Bob and vice versa, a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید