نتایج جستجو برای: were prioritized by graph theory so
تعداد نتایج: 8722802 فیلتر نتایج به سال:
abstract english language learning in iran has become significant in recent years, and english has been included in the curriculum of iranian schools and universities, and considerable attention has been paid to this language in our society. nevertheless, teaching and learning english in iranian schools has not been able to satisfy the specified goals, so different efl institutes have been est...
as polysemy is encountered frequently in english as foreign language. fl learners’ ability to disambiguate polysemous verbs becomes critical to their comprehension in the target language. this thesis, accordingly, investigated how iranian efl learners achieved comprehension of english polysemous verbs by using three different types of cues: (1) elaborated context, (2) semantic frames, and (...
Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...
dendrimer synthesis strategies now provide virtual control of macromolecular nanostructures as a function of size and surface/interior functionality. these strategies involve the covalent assembly of hierarchical components reactive monomers , branch cells or dendron’s around atomic or molecular cores according to divergent/convergent dendrite branching principles.combinon of two or more dendri...
An optimized method for data hiding into a digital color image in spatial domainis provided. The graph coloring theory with different color numbers is applied. To enhance thesecurity of this method, block correlations method in an image is used. Experimental results showthat with the same PSNR, the capacity is improved by %8, and also security has increased in themethod compared with other meth...
the analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. one is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. in terms of a graph, the concept of connectedness is used in dierent forms to study many of the measures of vulnerability. when certain ver...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید