نتایج جستجو برای: were prioritized by graph theory so

تعداد نتایج: 8722802  

Journal: :International Journal of Linguistics and Computational Applications 2021

Journal: :Advances in Mathematics 1976

Journal: :Bulletin of the American Mathematical Society 2005

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه علوم انسانی و مطالعات فرهنگی - دانشکده ادبیات، زبانهای خارجی و تاریخ 1391

abstract english language learning in iran has become significant in recent years, and english has been included in the curriculum of iranian schools and universities, and considerable attention has been paid to this language in our society. nevertheless, teaching and learning english in iranian schools has not been able to satisfy the specified goals, so different efl institutes have been est...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده زبانهای خارجی 1391

as polysemy is encountered frequently in english as foreign language. fl learners’ ability to disambiguate polysemous verbs becomes critical to their comprehension in the target language. this thesis, accordingly, investigated how iranian efl learners achieved comprehension of english polysemous verbs by using three different types of cues: (1) elaborated context, (2) semantic frames, and (...

Cheraghi Cheraghi, Massoud Hadian Dehkordi,

Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور مرکز - دانشکده شیمی 1391

dendrimer synthesis strategies now provide virtual control of macromolecular nanostructures as a function of size and surface/interior functionality. these strategies involve the covalent assembly of hierarchical components reactive monomers , branch cells or dendron’s around atomic or molecular cores according to divergent/convergent dendrite branching principles.combinon of two or more dendri...

An optimized method for data hiding into a digital color image in spatial domainis provided. The graph coloring theory with different color numbers is applied. To enhance thesecurity of this method, block correlations method in an image is used. Experimental results showthat with the same PSNR, the capacity is improved by %8, and also security has increased in themethod compared with other meth...

Journal: :journal of algorithms and computation 0
mahmood shabankhah university of tehran, college of engineering, faculty of engineering science

the analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. one is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. in terms of a graph, the concept of connectedness is used in di erent forms to study many of the measures of vulnerability. when certain ver...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید