نتایج جستجو برای: we choose a suitable scheme

تعداد نتایج: 13743735  

پایان نامه :0 1374

this study focuses on jane austens representation of her heroines in two of her novels: pride and prejudice, and mansfield park. i have concentrated only on a single idea: how jane austen takes her heroines through a course of psychogical reformation to which almost everything else in her novel is subsidiary. although i have discussed only pride and prejudice, we can trace austens carefully pla...

The notions of quasi-prime submodules and developed  Zariski topology was introduced by the present authors in cite{ah10}. In this paper we use these notions to define a scheme. For an $R$-module $M$, let $X:={Qin qSpec(M) mid (Q:_R M)inSpec(R)}$. It is proved that $(X, mathcal{O}_X)$ is a locally ringed space. We study the morphism of locally ringed spaces induced by $R$-homomorphism $Mrightar...

This paper introduces three coding strategies for using the Luby Transform (LT) code in a relay aided power-line communication scheme. In the first method, the relay decodes the received packets and re-encodes them for transmission towards the destination. In the second method, the relay only forwardes a random linear combination of its received packets towards the destination, while in the thi...

Journal: :مدیریت بازرگانی 0
محمود فیروزیان دانشگاه آزاد اسلامی کرج صمد نجفی محمدرضا لعلی حسین رضاپور

researchers in their reviewing of international market literature which practical experiences in iran indicate it demonstrate that to choose a foreign market there are two approaches: expansion and systematic approach. firms that use expansion approach, through the culturally and geographically similar markets starts working in international markets. however, in systematic approach, firms use a...

K. Busawon, R. Kharel, Z. Ghassemlooy,

In this paper, we propose a new chaos-based communication scheme using the observers. The novelty lies in the masking procedure that is employed to hide the confidential information using the chaotic oscillator. We use a combination of the addition and inclusion methods to mask the information. The performance of two observers, the proportional observer (P-observer) and the proportional integra...

Journal: :Health Promotion Practice 2018

Journal: :Journal of Interdisciplinary Studies in Education 2020

A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1390

throughout this dissertation r is a commutative ring with identity and m is a unitary r-module. in this dissertation we investigate submodules of multiplication , prufer and dedekind modules. we also stat the equivalent conditions for which is ring , wher l is a submodule of afaithful multiplication prufer module. we introduce the concept of integrally closed modules and show that faithful mu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید