نتایج جستجو برای: significant test
تعداد نتایج: 1849951 فیلتر نتایج به سال:
While the percentage of wealthy individuals in India is very small compared with developed markets, forecasted growth figures point toward a very high potential for asset accumulation over the foreseeable future. India has the key ingredients of a high-growth wealth management market, namely a very large and young mass affluent segment; an increase in the wealth of global Indians; the Indian go...
There are several errors in Figures 2 and 3 and their respective figure legends. Please see the corrected figures and their legends below. Copyright: ß 2014 The PLOS ONE Staff. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and sourc...
The importance of data hiding in the field of Information Technology is a widely accepted. The challenge is to be able to pass information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. Steganography is a technique that has been widely used to achieve this objective. However Steganography is often found to be lacking when it ...
Past research is not clear on the process by which rhetorical questions influence persuasion (i.e., increased focus on message arguments vs. on the persuasion agent). Based on recent theories of persuasion knowledge and rhetorical figures in advertising, our model delineates conditions under which rhetoricals are likely to enhance argument elaboration (low salience of the rhetorical) and those ...
Watermarking belongs to hide particular information, so that you can easily detect any tamper detection .It is used for confidenality, authentication and copy right protection. In this paper watermarking is done with the help of least significant bit technique (LSB).As LSB technique is used as it has less effect on image. This new algorithm is using LSB of original image and idoing ‘&&’ operati...
Cysouw (this volume) argues against the use of implicational universals in linguistic typology. While some of the points he makes are valid, his argumentation is in other places somewhat confused. I attempt in this paper to give some clarity to some of the issues, drawing on examples based on my typological database (Dryer 1989, 1991, 1992, 1997, 1998), which currently contains data for over 12...
An efficient architecture of a reconfigurable Least/Most Significant Bit multiplier for Galois field where , is presented. The proposed multiplier can operate either as a most significant or as a least significant bit first multiplier. The value m, of the irreducible polynomial degree, can be changed and the value of M determines the maximum size that the multiplier can support. This architectu...
For any authentication code for k source states and v messages having minimum possible deception probabilities (namely, P d 0 = k=v and P d 1 = (k ? 1)=(v ? 1)), we show that there must be at least v encoding rules. (This can be thought of as an authentication-code analogue of Fisher's Inequality .) We derive several properties that an extremal code must satisfy, and we characterize the extrema...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید