Ji Aliyê Rêbaz û Etîka Zanistî ve Rexneyek li ser Rêbera Rastnivîsînê ya Komxebata Kurmanciyê

نویسندگان

چکیده

Methodology and adherence to scientific ethics are the two most important points for any work. These that make a work successful or weak. This article, in this framework, is review of Kurdish Working Group's Writing Guide published by Mesopotamia Foundation December 2019. It understood from book result several years Kurmanci Group’s was prepared with participation 20 academics / academically affiliated people. Although it has been years, can be seen have serious problems terms methods ethics. Therefore, methodological its preparation process evaluated article.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Computational Efficiency of the Ji-Lee-Li Algorithm for the Assignment Problem

Ji et al. have conjectured that using the matrix form (to represent a basic solution) instead of the Simplex tableau in the dual Simplex method will lead to an algorithm with the time complexity comparable to the Hungarian algorithm for solving the Assignment Problem. In this note we show that both the time complexity and the CPU times of the Ji et al. algorithm are far away from being competit...

متن کامل

The Computational Efficiency of Ji-Lee-Li Algorithm for the Assignment Problem

Ji et al. have conjectured that using the matrix form (to represent a basic solution) instead of the Simplex tableau in the dual Simplex method will lead to an algorithm with the time complexity comparable to the Hungarian algorithm for solving the Assignment Problem. In this note we show that both the time complexity and the CPU times of the Ji et al. algorithm are far away from being competit...

متن کامل

Was what ail'd ya what kill'd ya?

Making use of those Union Army veterans for whom death certificates are available, we compare the conditions with which they were diagnosed by Civil War pension surgeons to the causes of death on the certificates. We divide the data between those veterans who entered the pension system early because of war injuries and those who entered the pension system after the 1890 reform that made it avai...

متن کامل

‘ ‘ Foiling the Cracker ’ ’ : yA

c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of kurdish studies

سال: 2023

ISSN: ['2149-2751']

DOI: https://doi.org/10.21600/ijoks.1234239