نتایج جستجو برای: needs a key variable

تعداد نتایج: 13537780  

Journal: :The Journal of the Korea Contents Association 2016

Journal: :iranian journal of public health 0
ali fakhri 1. dept. of health service management, school of health management and information sciences, iran university of medical sciences , tehran, iran. hesam seyedin 2. health management and economics research center, school of health management and information sciences, iran university of medical sciences, , tehran, iran. emmanuelle daviaud 3. health system research unit, medical research council south africa.

many studies have been carried out and many methods have been used for estimating health staff re-quirements in health facilities or system, each have different advantages and disadvantages. differences in the extent to which utilization matches needs in different conditions intensify the limitations of each approach when used in iso-lation. is the utilization-based approach efficient in a situ...

1999
Iain Middleton Mike McConnell Grant Davidson

This paper proposes a model for the structure and content of a university World Wide Web site, by a process of: (1) identifying who the site is serving and the information needs of these individuals or groups; (2) identifying institutional information needs; (3) relating this data to the content provided; (4) presenting the content in a manner suited to the characteristics and information needs...

2002
Byoungcheon Lee Kwangjo Kim

A digital signature provides the authenticity of a signed message with respect to a public key and a certificate provides the authorization of a signer for a public key. Digital signature and certificate are generated independently by different parties, but they are verified by the same verifier who wants to verify the signature. In the point of a verifier, verifying two independent digital sig...

2011
Chandrashekhar Meshram

In 1984, Shamir [1] introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify him self before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the “identity” of his communicatio...

Journal: :Quantum 2021

We establish an analytical lower bound on the asymptotic secret key rate of continuous-variable quantum distribution with arbitrary modulation coherent states. Previously, such bounds were only available for protocols a Gaussian modulation, and numerical existed in case simple phase-shift-keying modulations. The latter obtained as solution convex optimization problems our new matches results Gh...

2013
Chandrashekhar Meshram

In 1984, Shamir introduced the concept of an identity-based encryption. In this system, each user needs to visit a private key generation (PKG) and identify himself before joining a communication network. Once a user is accepted, the PKG will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the ―identity‖ of his communication partner ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی علوم پایه زنجان - دانشکده ریاضی 1393

in this thesis, a structured hierarchical methodology based on petri nets is used to introduce a task model for a soccer goalkeeper robot. in real or robot soccer, goalkeeper is an important element which has a key role and challenging features in the game. goalkeeper aims at defending goal from scoring goals by opponent team, actually to prevent the goal from the opponent player’s attacks. thi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید