نتایج جستجو برای: known as dhu
تعداد نتایج: 5882666 فیلتر نتایج به سال:
I lied to the future last night. I told it that soon it would be big and strong and profitable. I then tucked it into its crib, turned off the lights, and hoped the day would never come when the future would curse this lie. I not only assured the future it would someday be strong and profitable, I also told it how it would strong and profitable. My lie was a little more prosaic than my words su...
Recently, a RGB image encryption algorithm based on DNA encoding and chaos map has been proposed. It was reported that the encryption algorithm can be broken with four pairs of chosen plain-images and the corresponding cipher-images. This paper re-evaluates the security of the encryption algorithm, and finds that the encryption algorithm can be broken efficiently with only one known plain-image...
one of the most important number sequences in mathematics is fibonacci sequence. fibonacci sequence except for mathematics is applied to other branches of science such as physics and arts. in fact, between anesthetics and this sequence there exists a wonderful relation. fibonacci sequence has an importance characteristic which is the golden number. in this thesis, the golden number is observed ...
The study focuses on the emerging phenomenon of abda’u ritual at Eid al-Adha celebration in month Dhu al-Hijjah. by Tulehu society Moluccas, Indonesia is to identify trust and values local tradition as a form struggle, defense flag upholding, struggle for sacrificial animals with ideology upholding Islamic teachings. This uses communication media three goats be distributed indigenous village wh...
The scaling behaviour for the rectification of bipolar nanopores is studied using Nernst-Planck equation coupled to Local Equilibrium Monte Carlo method. nanopore's wall carries ? and ?? surface charge densities in its two half regions axially. Scaling means that device function (rectification) depends on system parameters (pore length, H, pore radius, R, concentration, c, voltage, U, density, ...
We analyse several well-known key establishment protocols for mobile communications. The protocols are examined with respect to their security and suitability in mobile environments. In a number of cases weaknesses are pointed out, and in many cases reenements are suggested, either to improve the eeciency or to allow simpliied security analysis.
One of the approaches to deliver real-time video encryption is to apply permutations to the bytes within a frame of a fully encoded MPEG stream as presented in [2]. We demonstrate that this particular algorithm is vulnerable to a known-plaintext attack, and hence its use should be carefully considered. We also discuss modifications that can make the algorithm resistant to our attack.
For several years now, you’ve been hearing and reading about an emerging standard that everybody has been calling SQL3. Intended as a major enhancement of the current second generation SQL standard, commonly called SQL-92 because of the year it was published, SQL3 was originally planned to be issued in about 1996...but things didn’t go as planned. As you may be aware, SQL3 has been characterize...
This analysis attempts to answer the question of whether similar molecules crystallize in a similar manner. An analysis of structures in the Cambridge Structural Database shows that the answer is yes - sometimes they do, particularly for single-component structures. However, one does need to define what we mean by similar in both cases. Building on this observation we then demonstrate how this ...
In this paper the author presents medicinal or otherwise useful weed species with details of family, vernacular name and its medicinal utility. Information on other general economic importance of medicinal weeds is also described here.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید