نتایج جستجو برای: 13

تعداد نتایج: 332548  

2005
Paul Garrett

would be a square. One could factor this into primes in Z to see that it is not a square, or hope that it is not a square modulo some relatively small prime. Indeed, modulo 11 it is 2, which is not a square modulo 11 (by brute force, or by Euler’s criterion (using the cyclicness of (Z/11)×) 2(11−1)/2 = −1 mod 11, or by recalling the part of Quadratic Reciprocity that asserts that 2 is a square ...

2006
Joan Vernikos William Paloski Charles Fuller Gilles Clément

2009
Christopher W. Fink

INTRODUCTION Additive manufacturing (AM) refers to a process that builds up a component in layers, as opposed to a subtractive operation, which removes matter from a block of material to form a product.[1,2] An increase in customer demand for customizable, quick turnaround, low cost products has opened the door for AM processes to enter the large scale production market once dominated by subtra...

2006
G. DOUNIAS B. BJERREGAARD J. JANTZEN A. TSAKONAS N. AMPAZIS G. PANAGI E. PANOURGIAS

In this study the performance of various intelligent methodologies is compared in the task of pap-smear diagnosis. The selected intelligent methodologies are briefly described and explained, and then, the acquired results are presented and discussed for their comprehensibility and usefulness to medical staff, either for fault diagnosis tasks, or for the construction of automated computer-assist...

1998
Dario Maestripieri Kelly A. Carroll

VOL. 9, NO. 2, MARCH 1998 Copyright © 1998 American Psychological Society 143 Abstract— This study investigated maternal abuse and neglect of offspring in a large population of rhesus monkeys over a period of 29 years. Abuse and neglect did not occur together and were associated with different risk factors. Infant abuse was concentrated in 8 of 57 families and among closely related females. Abu...

2018
Meenakshi Sundaram A. C. Nandini

For an efficient image security, image hashing is one of the solutions for image authentication. A robust image hashing mechanism must be robust to image processing operations as well as geometric distortions. A better hashing technique must ensure an efficient detection of image forgery like insertion, deletion, replacement of objects, malicious color tampering, and for locating the exact forg...

Journal: :Veritas: Jurnal Teologi dan Pelayanan 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید