نتایج جستجو برای: alternative methods

تعداد نتایج: 2112311  

Journal: :International Journal of Pharmacy Practice 2004

Journal: :Environmental Health Perspectives 2010

Journal: :Genomics, Proteomics & Bioinformatics 2017

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :Journal of the Hellenic Veterinary Medical Society 2017

2002
A. GILONI

This paper is a survey on traditional linear regression techniques using the !I-, ez-, and &,-norm. We derive the characterization of the respective regression estimates (including optimality and uniqueness criteria), as well as discuss some of their statistical properties. @ 2002 Elsevier Science Ltd. All rights reserved. Keywords-el-, e2-, &-regression, Linear programming.

Journal: :Journal of The Korean Society of Agricultural Engineers 2009

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید