نتایج جستجو برای: upward embedding
تعداد نتایج: 86962 فیلتر نتایج به سال:
Three studies show that different forms of self-activation have differential influences on the processing of social comparison information. Activating neutral self-conceptions results in defensive processing of threatening social comparison information (Study 1). Participants maintain favorable self-evaluations in the face of upward comparison and rate the upward target of comparison negatively...
the notions of quasi-prime submodules and developed zariski topology was introduced by the present authors in cite{ah10}. in this paper we use these notions to define a scheme. for an $r$-module $m$, let $x:={qin qspec(m) mid (q:_r m)inspec(r)}$. it is proved that $(x, mathcal{o}_x)$ is a locally ringed space. we study the morphism of locally ringed spaces induced by $r$-homomorphism $mrightar...
PURPOSE We developed an inverse technique for tissue morcellation by modifying the conventional upward technique and then examined its safety and efficiency. MATERIALS AND METHODS From July 2008 to December 2010, a total of 389 consecutive patients treated with holmium laser enucleation of the prostate (HoLEP) were enrolled in this study. For tissue morcellation, we used an upward technique f...
The authors assess the stabilization properties of simple monetary policy rules within the context of a small open-economy model constructed around the limited-participation assumption and calibrated to salient features of the Canadian economy. By relying on limited participation as the main nominal friction that affects the artificial economy, the authors provide an important check of the robu...
we present a steganalysis scheme for lsb matching steganography based on feature vectors extracted from integer wavelet transform (iwt). in integer wavelet decomposition of an image, the coefficients will be integer, so we can calculate co-occurrence matrix of them without rounding the coefficients. before calculation of co-occurrence matrices, we clip some of the most significant bitplanes of ...
In this paper, we investigate planar upward straight-line grid drawing problems for bounded-degree rooted trees so that a drawing takes up as little area as possible. A planar upward straight-line grid tree drawing satisses the following four constraints: (1) all vertices are placed at distinct grid points (grid), (2) all edges are drawn as straight lines (straight-line), (3) no two edges in th...
Recent increases in the use of hydraulic fracturing (HF) to aid extraction of oil and gas from black shales have raised concerns regarding potential environmental effects associated with predictions of upward migration of HF fluid and brine. Some recent studies have suggested that such upward migration can be large and that timescales for migration can be as short as a few years. In this articl...
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید