نتایج جستجو برای: womersles parameter
تعداد نتایج: 214899 فیلتر نتایج به سال:
Basics We will use the following parameters: • n, the security parameter.
Working memory capacity is one of the most important learner's characteristics that can be used as an input parameter for personalizing learning in order to improve the learning process. Therefore, knowing learner’s working memory capacity and personalizing the learning contents according to learner’s working memory capacity levels are important research issues. This paper proposes an approach ...
We had found functions can be used to fix bits [2] by given differences. We use these functions build a message expansion function. In the message expansion function, there are some bits include message bits and incremental bits produced from message bits, these bits will be used as parameter of date-depend function. This message expansion function will fixed at lease n × 5 . 5 bits with given ...
این پایان نامه به بررسی و مقایسه دو موضوع مطابقه میان فعل و فاعل (از نظر شخص و مشار) و هسته عبارت در دو زبان انگلیسی و آذربایجانی می پردازد. اول رابطه دستوری مطابقه مورد بررسی قرار می گیرد. مطابقه به این معناست که فعل مفرد به همراه فاعل مفرد و فعل جمع به همراه فاعل جمع می آید. در انگلیسی تمام افعال، بجز فعل بودن (to be) از نظر شمار با فاعلشان فقط در سوم شخص مفرد و در زمان حال مطابقت نشان میدهند...
We consider a variant of the game of Cops and Robbers, called Lazy Cops and Robbers, where at most one cop can move in any round. We investigate the analogue of the cop number for this game, which we call the lazy cop number. Lazy Cops and Robbers was recently introduced by Offner and Ojakian, who provided asymptotic upper and lower bounds on the lazy cop number of the hypercube. By coupling th...
Publications are increasingly (often wrongly) being used as research outputs. Furthermore, ‘impacts’ of such publications are often (wrongly as well) measured using ‘citations’. Popular metric, like the ‘Hirsch index’, or ‘h-index’ is used as yardstick for judging the quality of individual researchers. However, there are many controversies around it, whether it is a good yardstick, which could ...
In this paper, we construct a fully homomorphic encryption (FHE) scheme over integers with the message space ZQ for any prime Q. Even for the binary case Q = 2, our decryption circuit has a smaller degree than that of the previous scheme; the multiplicative degree is reduced from O(λ(log λ)) to O(λ), where λ is the security parameter. We also extend our FHE scheme to a batch FHE scheme.
A confidence interval is an interval (i.e., a range of values) estimate of a parameter of a population (e.g., a mean) calculated from a sample drawn from the population. A confidence interval has an associated confidence level, which is frequency with which a calculated confidence interval is expected to contain the population parameter. Confidence intervals are of interest in modeling and simu...
In this paper we propose a method for implementing a high-level interface for the synthesis and animation of animated virtual faces that is in full compliance with MPEG-4 specifications. This method allows us to implement the Simple Facial Object profile and part of the Calibration Facial Object Profile. In fact, starting from a facial wire-frame and from a set of configuration files, the devel...
A g-element for a graded R-module is a one-form with properties similar to a Lefschetz class in the cohomology ring of a compact complex projective manifold, except that the induced multiplication maps are injections instead of bijections. We show that if k(∆) is the face ring of the independence complex of a matroid and the characteristic of k is zero, then there is a non-empty Zariski open su...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید