نتایج جستجو برای: upward embedding

تعداد نتایج: 86962  

Journal: :Personality & social psychology bulletin 2006
Saskia A Schwinghammer Diederik A Stapel Hart Blanton

Three studies show that different forms of self-activation have differential influences on the processing of social comparison information. Activating neutral self-conceptions results in defensive processing of threatening social comparison information (Study 1). Participants maintain favorable self-evaluations in the face of upward comparison and rate the upward target of comparison negatively...

Journal: :journal of algebra and related topics 2014
a. abbasi d. hassanzadeh-lelekaami

the notions of quasi-prime submodules and developed  zariski topology was introduced by the present authors in cite{ah10}. in this paper we use these notions to define a scheme. for an $r$-module $m$, let $x:={qin qspec(m) mid (q:_r m)inspec(r)}$. it is proved that $(x, mathcal{o}_x)$ is a locally ringed space. we study the morphism of locally ringed spaces induced by $r$-homomorphism $mrightar...

2012
Su Hyung Lee Jong In Choi Kyung Young Moon Woong Na Jong Bouk Lee

PURPOSE We developed an inverse technique for tissue morcellation by modifying the conventional upward technique and then examined its safety and efficiency. MATERIALS AND METHODS From July 2008 to December 2010, a total of 389 consecutive patients treated with holmium laser enucleation of the prostate (HoLEP) were enrolled in this study. For tissue morcellation, we used an upward technique f...

2000
Scott Hendry Wai-Ming Ho Kevin Moran

The authors assess the stabilization properties of simple monetary policy rules within the context of a small open-economy model constructed around the limited-participation assumption and calibrated to salient features of the Canadian economy. By relying on limited participation as the main nominal friction that affects the artificial economy, the authors provide an important check of the robu...

Journal: :international journal of electrical and electronics engineering 0
m. abolghasemii h. aghaeiniaii k. faeziii

we present a steganalysis scheme for lsb matching steganography based on feature vectors extracted from integer wavelet transform (iwt). in integer wavelet decomposition of an image, the coefficients will be integer, so we can calculate co-occurrence matrix of them without rounding the coefficients. before calculation of co-occurrence matrices, we clip some of the most significant bitplanes of ...

1996
Chan-Su Shin Sung Kwon Kim Kyung-Yong Chwa

In this paper, we investigate planar upward straight-line grid drawing problems for bounded-degree rooted trees so that a drawing takes up as little area as possible. A planar upward straight-line grid tree drawing satisses the following four constraints: (1) all vertices are placed at distinct grid points (grid), (2) all edges are drawn as straight lines (straight-line), (3) no two edges in th...

2014
Samuel A Flewelling Manu Sharma

Recent increases in the use of hydraulic fracturing (HF) to aid extraction of oil and gas from black shales have raised concerns regarding potential environmental effects associated with predictions of upward migration of HF fluid and brine. Some recent studies have suggested that such upward migration can be large and that timescales for migration can be as short as a few years. In this articl...

Journal: :Topology and its Applications 2012

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

Journal: :Tsukuba Journal of Mathematics 1997

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید