منابع مشابه
Similarity DH-Algebras
In cite{GL}, B. Gerla and I. Leuc{s}tean introduced the notion of similarity on MV-algebra. A similarity MV-algebra is an MV-algebra endowed with a binary operation $S$ that verifies certain additional properties. Also, Chirtec{s} in cite{C}, study the notion of similarity on L ukasiewicz-Moisil algebras. In particular, strong similarity L ukasiewicz-Moisil algebras were defined. In this paper...
متن کاملThe Position of Anatolian
The Position of Anatolian 6.1 History of the Question 6.1.1 Discovery and Recognition Hrozný (1917) showed that the chief administrative language of the Hittite Empire, attested in cuneiform documents from Hattusha in central Turkey dating from the 16th-13th centuries BCE, was Indo-European. Through the work of a number of scholars it was known by the 1930s that Hittite was not alone in ancient...
متن کاملCrustal structure of the North Anatolian and East Anatolian Fault Systems from magnetotelluric data
Magnetotelluric (MT) studies can map subsurface resistivity structure and have located zones of low resistivity (high conductivity) within major strike-slip fault zones worldwide which have been interpreted as regions of elevated fluid content. This study describes MT data from the eastern part of the North Anatolian and the East Anatolian Fault Systems (NAFS and EAFS) and presents the results ...
متن کاملPulse Interval Modulation – Dual Header (PIM-DH)
This paper introduces digital pulse interval modulation with dual header, a new form of digital pulse time modulation scheme offering increase transmission capacity, requiring less transmission bandwidth, and it has built-in frame and slot synchronisation capability. Theoretical expressions are describing the code characteristics and showing the advantages of this new scheme. Matlab is used to ...
متن کاملBetween Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
In this paper, we introduce the intermediate hashed Diffie-Hellman (IHDH) assumption which is weaker than the hashed DH (HDH) assumption (and thus the decisional DH assumption), and is stronger than the computational DH assumption. We then present two public key encryption schemes with short ciphertexts which are both chosen-ciphertext secure under this assumption. The short-message scheme has ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bulletin of the Society for Near Eastern Studies in Japan
سال: 1997
ISSN: 0030-5219,1884-1406
DOI: 10.5356/jorient.40.24