نتایج جستجو برای: implementation methods

تعداد نتایج: 2166756  

Journal: :Review of Economic Design 1999

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده ادبیات و علوم انسانی 1392

abstract the present study was conducted in order to investigate the impact of an integrated model of form-focused and task-based instruction on iranian efl learners vocabulary learning and retention.it also aimed to detect efl learners attitude towards the implementation of form-focused task-based vocabulary instruction in the classroom. in order to address the purposes of this study, a sampl...

Journal: :Proceedings of the Institute for System Programming of RAS 2013

Journal: :Computers & Mathematics with Applications 2013

Journal: :Journal of the Royal Statistical Society 2021

Journal of the Royal Statistical Society: Series A (Statistics in Society)Early View BOOK REVIEW Cure models: Methods, applications and implementation , Peng, Yingwei, Yu, Binbing, 2021, Hardback, first edition, Chapman & Hall/CRC Biostatistics Series, 268 pages, £74.99, ISBN-9780367145576 Ash Bullement, Bullement [email protected] Delta Hat Ltd, Nottingham, UK University Sheffield, UKSearch...

2003
Ismael Herrera David E. Keyes Olof B. Widlund Robert Yates R. Yates I. Herrera

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید