نتایج جستجو برای: combination of data hiding and cryptography

تعداد نتایج: 24168851  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مدیریت و حسابداری 1391

the application of e-learning systems - as one of the solutions to the issue of anywhere and anytime learning – is increasingly spreading in the area of education. content management - one of the most important parts of any e-learning system- is in the concern of tutors and teachers through which they can obtain means and paths to achieve the goals of the course and learning objectives. e-learn...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده ادبیات و علوم انسانی 1391

the purpose of this two-phase, sequential mixed methods study was to find out whether there were any decencies between male and female ma students’ theses regarding the common features of academic writing such as syntactic complexity, means of integrating cited information, and organizing arguments. i chose 10 male written theses and 15 female written theses in tefl and linguistics. in the firs...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

this study considers the level of increase in customer satisfaction by supplying the variant customer requirements with respect to organizational restrictions. in this regard, anp, qfd and bgp techniques are used in a fuzzy set and a model is proposed in order to help the organization optimize the multi-objective decision-making process. the prioritization of technical attributes is the result ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده علوم انسانی 1393

learning-oriented assessment seeks to emphasise that a fundamental purpose of assessment should be to promote learning. it mirrors formative assessment and assessment for learning processes. it can be defined as actions undertaken by teachers and / or students, which provide feedback for the improvement of teaching and learning. it also contrasts with equally important measurement-focused appro...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد مرودشت - دانشکده علوم تربیتی و روانشناسی 1393

type text or a website address or translate a document. abstract liquidity is considered the most important aspect of the development of stock markets. the main objective of this study was to evaluate the effect of the quality of financial information provided to replace its financial statements nmvdh and shrkt hayy that the liquidity of the shares on the tehran stock exchange is between the ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده علوم تربیتی و روانشناسی 1393

the purpose of this study was to investigate the relationship between teachers’ class management practices with students’ self- regulated learning and academic self-efficacy. in this study relating to the management class, three dimensions, (training management, people management and behavior management) and three style (interventionist, interactionist and non-interventionist) was considered. r...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده ادبیات و علوم انسانی 1391

nowadays enhancing critical thinking in learners is considered one of the foreign language teachers’ tasks due to its high position in foreign language classrooms. when it comes to selecting materials for language classrooms, there are obviously some criteria that teachers should apply. the present study aimed at a critical thinking based analysis of ten picture story books and ten folktales th...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم انسانی 1391

the present study aimed at investigating how different news agencies using the concept of legitimation/delegitimation represent the same event differently. to this end, van leeuwens (2008) legitimatory/delegitimatory framework was applied to the data gleaned from the iranian state-run news agency fars news, british state-run news agency bbc, and also american state-run news agency voa. the resu...

2014
Syed Abdul Sattar

Digital watermarking is not a new name in the tech neology world but there are different techniques in data hiding which are similar to watermarking. In this paper we compare digital watermarking with other techniques of data hiding. Stenography, Fingerprinting, cryptography and Digital signature techniques are compared with watermarking. We need water marking for digital data security .It prov...

پایان نامه :0 1374

the present study investigated the effect of the two vocabulary teaching techniques in est, namely the use of translation and the use of visual aids as two separate vocabulary teaching techniques. to answer the question of the study, a pretest (michigan test) was administered to the 58 randomly selected est students at khajeh nasiredin tusi university, faculty of mechanics. after the homogeneit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید