Proposing a concept of complexing functions.
نویسندگان
چکیده
منابع مشابه
wuthering heights and the concept of marality/a sociological study of the novel
to discuss my point, i have collected quite a number of articles, anthologies, and books about "wuthering heights" applying various ideas and theories to this fantastic story. hence, i have come to believe that gadamer and jauss are rightful when they claim that "the individaul human mind is the center and origin of all meaning," 3 that reading literature is a reader-oriented activity, that it ...
15 صفحه اولa contrastive study of rhetorical functions of citation in iranian and international elt scopus journals
writing an academic article requires the researchers to provide support for their works by learning how to cite the works of others. various studies regarding the analysis of citation in m.a theses have been done, while little work has been done on comparison of citations among elt scopus journal articles, and so the dearth of research in this area demands for further investigation into citatio...
Proposing a Participatory Model of Teacher Evaluation
Introduction: Developing a fair and organized evaluation system with faculty members’ own participation, could lead to faculty members’ more satisfaction with evaluation. The goal of this study was to determine the effects of a participatory model of evaluation on faculty members’ perspective toward this model. Methods: In this pre-experimental study as one shot case study, 55 faculty members...
متن کامل[ Proposing a low-density
T he objectives of this article are two-fold: First, to present the problem of joint source and channel (JSC) coding from a graphical model perspective and second, to propose a structure that uses a new graphical model for jointly encoding and decoding a redundant source. In the first part of the article, relevant contributions to JSC coding, ranging from the Slepian-Wolf problem to joint decod...
متن کاملProposing A Ciphering Protocol
This paper describes a novel bit level stream cipher based symmetric key cryptographic technique. At first, sender and receiver agree upon a symmetric key. Then the symmetric key is formed using Greatest Common Divisor (G.C.D) of sum of even or odd bit positional weight even or odd number and a symmetric key value is derived from the symmetric by the sender. The symmetric key value is XORed wit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Japan Society for Composite Materials
سال: 1997
ISSN: 0385-2563
DOI: 10.6089/jscm.23.206