نتایج جستجو برای: the middle way

تعداد نتایج: 16086368  

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2000
R B Laughlin D Pines J Schmalian B P Stojkovic P Wolynes

Mesoscopic organization in soft, hard, and biological matter is examined in the context of our present understanding of the principles responsible for emergent organized behavior (crystallinity, ferromagnetism, superconductivity, etc.) at long wavelengths in very large aggregations of particles. Particular attention is paid to the possibility that as-yet-undiscovered organizing principles might...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1390

any change in the refractive index of a laser active medium can lead to serious degradation of beam quality, laser beam modes, laser performance and variation in the intensity distribution. alteration in the refractive index of laser active medium is especially notable in high power lasers. it is clear that in the laser beam production, the pumping agent induces a great amount of heat which...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده ادبیات و علوم انسانی 1392

this study investigates the relationships between iranian efl teachers’ perfectionism, burnout and their teaching style preferences, and also the difference between male and female efl teachers and their teaching style preferences. to this end, a sample of 99 efl teachers (46 males and 53 females), who had years of teaching experience, were selected. the measurement scales used in this study we...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده علوم انسانی 1393

learning-oriented assessment seeks to emphasise that a fundamental purpose of assessment should be to promote learning. it mirrors formative assessment and assessment for learning processes. it can be defined as actions undertaken by teachers and / or students, which provide feedback for the improvement of teaching and learning. it also contrasts with equally important measurement-focused appro...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده زبانهای خارجی 1393

feminine voice and narratology in wuthering heights wuthering heights as a general "bronte" work has extraordinary dimensions to it which can make it focal to different ways of interpretation. among other differences the issue of narrative voice is essential in understanding the ultimate purpose of wuthering heights. emily bronte uses different narrators from various focal points speaking of m...

پایان نامه :0 1374

this thesis aims to adduce an unmitigated and comprehensive explication concerning the relationship of three significant elements of fiction: setting, chracter and theme. my research is basically placed on two outstanding novels of the 19th century: emily brontes wuthering heights and thomas hardys return of the native. my endeavour lies in studying the correlation among the three above-mention...

1996
Ueli M. Maurer

This paper provides a uniied and generalized treatment of information-theoretic lower bounds on an opponent's probability of cheating in one-way message authentication. It extends and generalizes, in a number of directions, the substantial body of known results, each of which holds only for a certain restricted scenario. At the same time the treatment of unconditionally-secure authentication is...

Journal: :IACR Cryptology ePrint Archive 2009
Kazumaro Aoki Jian Guo Krystian Matusiewicz Yu Sasaki Lei Wang

In this paper, we present preimage attacks on up to 43step SHA-256 (around 67% of the total 64 steps) and 46-step SHA-512 (around 57.5% of the total 80 steps), which significantly increases the number of attacked steps compared to the best previously published preimage attack working for 24 steps. The time complexities are 2, 2 for finding pseudo-preimages and 2, 2 compression function operatio...

Journal: :CoRR 2014
Subhash C. Kak

The piggy bank idea allows one-way encryption of information that can be accessed only by authorized parties. Here we show how the piggy bank idea can be used to authenticate parties to counter man-in-the-middle (MIM) attack that can jeopardize the double-lock cryptography protocol. We call this method double-signature double lock cryptography and it can be implemented in ways that go beyond ha...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی علوم پایه زنجان - دانشکده شیمی 1391

in this thesis a calibration transfer method is used to achieve bilinearity for augmented first order kinetic data. first, the proposed method is investigated using simulated data and next the concept is applied to experimental data. the experimental data consists of spectroscopic monitoring of the first order degradation reaction of carbaryl. this component is used for control of pests in frui...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید