Proto-Anatolian *dh

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Similarity DH-Algebras

In  cite{GL}, B. Gerla and I. Leuc{s}tean introduced the notion of similarity on MV-algebra. A similarity MV-algebra is an MV-algebra endowed with a binary operation $S$ that verifies certain additional properties. Also, Chirtec{s} in cite{C}, study the notion of similarity on L ukasiewicz-Moisil algebras. In particular, strong similarity L ukasiewicz-Moisil algebras were defined. In this paper...

متن کامل

The Position of Anatolian

The Position of Anatolian 6.1 History of the Question 6.1.1 Discovery and Recognition Hrozný (1917) showed that the chief administrative language of the Hittite Empire, attested in cuneiform documents from Hattusha in central Turkey dating from the 16th-13th centuries BCE, was Indo-European. Through the work of a number of scholars it was known by the 1930s that Hittite was not alone in ancient...

متن کامل

Crustal structure of the North Anatolian and East Anatolian Fault Systems from magnetotelluric data

Magnetotelluric (MT) studies can map subsurface resistivity structure and have located zones of low resistivity (high conductivity) within major strike-slip fault zones worldwide which have been interpreted as regions of elevated fluid content. This study describes MT data from the eastern part of the North Anatolian and the East Anatolian Fault Systems (NAFS and EAFS) and presents the results ...

متن کامل

Pulse Interval Modulation – Dual Header (PIM-DH)

This paper introduces digital pulse interval modulation with dual header, a new form of digital pulse time modulation scheme offering increase transmission capacity, requiring less transmission bandwidth, and it has built-in frame and slot synchronisation capability. Theoretical expressions are describing the code characteristics and showing the advantages of this new scheme. Matlab is used to ...

متن کامل

Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption

In this paper, we introduce the intermediate hashed Diffie-Hellman (IHDH) assumption which is weaker than the hashed DH (HDH) assumption (and thus the decisional DH assumption), and is stronger than the computational DH assumption. We then present two public key encryption schemes with short ciphertexts which are both chosen-ciphertext secure under this assumption. The short-message scheme has ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bulletin of the Society for Near Eastern Studies in Japan

سال: 1997

ISSN: 0030-5219,1884-1406

DOI: 10.5356/jorient.40.24