نتایج جستجو برای: needs a key variable
تعداد نتایج: 13537780 فیلتر نتایج به سال:
many studies have been carried out and many methods have been used for estimating health staff re-quirements in health facilities or system, each have different advantages and disadvantages. differences in the extent to which utilization matches needs in different conditions intensify the limitations of each approach when used in iso-lation. is the utilization-based approach efficient in a situ...
This paper proposes a model for the structure and content of a university World Wide Web site, by a process of: (1) identifying who the site is serving and the information needs of these individuals or groups; (2) identifying institutional information needs; (3) relating this data to the content provided; (4) presenting the content in a manner suited to the characteristics and information needs...
A digital signature provides the authenticity of a signed message with respect to a public key and a certificate provides the authorization of a signer for a public key. Digital signature and certificate are generated independently by different parties, but they are verified by the same verifier who wants to verify the signature. In the point of a verifier, verifying two independent digital sig...
In 1984, Shamir [1] introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify him self before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the “identity” of his communicatio...
We establish an analytical lower bound on the asymptotic secret key rate of continuous-variable quantum distribution with arbitrary modulation coherent states. Previously, such bounds were only available for protocols a Gaussian modulation, and numerical existed in case simple phase-shift-keying modulations. The latter obtained as solution convex optimization problems our new matches results Gh...
In 1984, Shamir introduced the concept of an identity-based encryption. In this system, each user needs to visit a private key generation (PKG) and identify himself before joining a communication network. Once a user is accepted, the PKG will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the ―identity‖ of his communication partner ...
in this thesis, a structured hierarchical methodology based on petri nets is used to introduce a task model for a soccer goalkeeper robot. in real or robot soccer, goalkeeper is an important element which has a key role and challenging features in the game. goalkeeper aims at defending goal from scoring goals by opponent team, actually to prevent the goal from the opponent player’s attacks. thi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید