نتایج جستجو برای: full electronic original check and substituted electronic check principally
تعداد نتایج: 16894470 فیلتر نتایج به سال:
In this paper, we conclude five kinds of methods for construction the regular low-density parity matrix H and three irregular parity-check H. Through analysis code rate parameters these eight structures, find that tends to be more flexible parameter variability is enhanced. We propose current development cost should lower with progress electronic technology need research on practical Low-Densit...
abstract the present study was conducted in order to investigate the impact of an integrated model of form-focused and task-based instruction on iranian efl learners vocabulary learning and retention.it also aimed to detect efl learners attitude towards the implementation of form-focused task-based vocabulary instruction in the classroom. in order to address the purposes of this study, a sampl...
The essence of this proposal is that voters are given a printed copy of their electronic vote, which they verify before casting their electronic vote, and which they drop into a traditional ballot box. At the count centre an audit takes place in two stages. First, a random sample of paper ballots is taken from the ballot boxes and compared with the aggregated file of mixed and numbered electron...
First principle calculations of nanolayered ZnO polymorphs (Wurzite–, Zincblende–, Rocksalt–structures) in the scheme of density functional theory were performedwith the help of full potential linear augmented plane wave (FP-LAPW) method. Theexchange - correlation potential is described by generalized gradient approximation asproposed by Perdew–Burke–Ernzrhof (GGA–PBE) and modified Becke–Johns...
in order to compare the performance of different weed mangement methods in spring and waiting planting of rainfed chickpea this experiment was carrid out as split plot in randomized complete block design with four replications at maragheh agricaltural research station during 2004–2005 crop season. the main factors were planting ِdates including the waiting and spring planting. sub plots were wee...
The molecular properties known to play an essential role in drug-receptor interaction of substructures models of bioactive molecules have been studied using chemical quantum calculations. 1,4-diformyl-piperazine and 1,4-dithionyl-piperazine have been used as models to probe conformational behaviors and some electronic properties of substructure of some tri-substituted piperazine showing dual an...
2. Author groups: Please check that all names have been spelled correctly and appear in the correct order. Please also check that all initials are present. Please check that the author surnames (family name) have been correctly identified by a pink background. If this is incorrect, please identify the full surname of the relevant authors. Occasionally, the distinction between surnames and foren...
In this paper, we present a method and a tool to build symbolic labelled transition systems from B specifications. The tool, called GeneSyst, can take into account refinement levels and can visualize the decomposition of abstract states in concrete hierarchical states. The resulting symbolic transition system represents all the behaviors of the initial B event system. So, it can be used to reas...
In this paper, we discussed current limitation in the electronic-design-automotation (EDA) tool on tracing the always on routing. We developed an algorithm to efficiently track the secondary power routing and accurately estimate the routing quality using approximate voltage drop as the criteria. The fast check can identify potential hotspot issues without going through sign-off checks. It helps...
In this paper we present a mix-type remote electronic voting system belonging to the “proof of product with redundancy” paradigm. Votes are composed using a redundancy system that permits to prove the correct composition and plaintext awareness of votes at vote reception and check the validity of the mixing operation while preventing some privacy or denial of service attacks that were possible ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید