نتایج جستجو برای: needs a key variable
تعداد نتایج: 13537780 فیلتر نتایج به سال:
Quantum key distribution with continuous variables already uses advantageous high-speed single-mode homodyne detection low electronic noise at room temperature. Together continuous-variable information encoding to nonclassical states, the distance for secure transmission through lossy channels can approach 300 km in current optical fibers. Such protocols tolerate higher channel and also limited...
abstract deviation or in other words committing a crime is literally a social problem. this research that was conducted in 1389 and 1390 has tried to investigate the causes of crimes committed by young male inmates qazvin central prison and effective variables on their tendency to deviation. accordingly after collecting theoretical framework and offering theoretical model including both hirsch...
Authentication protocols (including protocols that provide key establishment) are designed to work correctly in the presence of an adversary that can prompt honest principals to engage in an unbounded number of concurrent runs of the protocol. The amount of local state maintained by a single run of an authentication protocol is bounded. Intuitively, this suggests that there is a bound on the re...
Background: Ultrasound is preferred as first imaging modality in the study of the female pelvis. In this article, we have tried to mention 8 points that each midwife or nurse needs to know for planning the time of sonography and analysis of findings. Results: During the menstrual cycle, all pelvic organs are influenced by cyclic changes. Thus, pathologic conditions of pelvis need to be well ass...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
My research is aimed at finding efficient coordination methods for multi-objective collaborative multi-agent decision theoretic planning. Key to coordinating efficiently in these settings is exploiting loose couplings between agents. We proposed two algorithms for the case in which the agents need to make a single collective decision: convex multiobjective variable elimination (CMOVE) and varia...
A theoretical framework for DSS research is developed in terms of the key elements of theory: domain boundaries, constructs, and relationships among constructs. Eight broad DSS constructs (environment, task, implementation strategy, DSS capability, DSS configuration, user, user behaviour, and performance) are identified. Based on a review of the literature, 17 relationships among these construc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید