نتایج جستجو برای: the secret agent
تعداد نتایج: 16078161 فیلتر نتایج به سال:
in this thesis, a new optically active poly(amide-imide) (pai) was synthesized by the indirect polycondensation reaction of the l-phenylalanine based diacid chloride and 4,4?-diaminodiphenylether in the presence of triethylamine in n-methyl-2-pyrrolidone. the formation of pai was confirmed by ftir, 1h nmr and elemental analysis. in next step, the surface of titanium dioxide (tio2) nanoparticles...
iv Table of
Gray markets are unauthorized channels of distribution for a supplier’s authentic products. This paper studies a distribution channel that consists of a supplier who offers all-unit quantity discounts for batch orders to enjoy cost savings, and a reseller who may divert some goods to the gray markets. Our analysis shows the impact of gray markets depends on the reseller’s batch inventory holdin...
Waiting for a savior and a better future has been known as a true and respectable idea of revealed religions. However, little considerable study has been performed on the real meaning of waiting as a Divine promise in the prophets and their followers` minds and lives. On the studies in the field, the problem of waiting as a continuous reality in the history of prophecy may be searched in the ve...
in a multi-secret sharing scheme, several secret values are distributed among a set of n participants.in 2000 chien et al.'s proposed a (t; n) multi-secret sharing scheme. many storages and publicvalues required in chien's scheme. motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the lagrange interpolation formula for polynomials andcip...
Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...
Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...
Steganography is the art and science of hiding information. This paper introduces a technique for extracting secret information electronically encoded in most creative ways. We propose a system capable to detect (or extract) secret information using any generic steganalytic algorithm. The system is based on agent computing approach where the autonomic agent would traverse across several website...
Endothelial dysfunction can be considered the heart of many kidney and metabolic diseases, including primary hypertension, diabetic nephropathy, and CKD. However, perhaps the conditions most associated with dysfunction or injury of the endothelium are thrombotic microangiopathies (TMAs), such as hemolytic uremic syndrome (HUS) and thrombotic thrombocytopenic purpura (TTP). Specific types of the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید