نتایج جستجو برای: usually denoted 1 and 0 respectively

تعداد نتایج: 17337422  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

hedging is a multi-purpose rhetorical strategy which is usually used in scientific arguments to secure ratification of claims, reduce the risk of negation, avoid conflict, manage disagreement and leave room for the audience to assess presented information. hedges are frequently used in research articles to mitigate the findings of research endeavors. the present research aims to investigate the...

2010
Yuming Jiang

This note is to provide results for and give hints on applying stochastic network calculus to service guarantee analysis say of wireless networks. At this moment of writing, the focus is on single hop networks. At the end of the note, potential research topics are discussed. 1 Preliminaries 1.1 Model and Notation We consider discrete-time single cell wireless networks. All nodes share a wireles...

پایان نامه :وزارت بهداشت، درمان و آموزش پزشکی - دانشگاه علوم پزشکی و خدمات بهداشتی درمانی مشهد - دانشکده دندانپزشکی 1390

objective: the objective of this study was to investigate the invitro fluoride release of four new self-adhesive resin cements; set (sdi, australia), breeze (pentron, usa), embrace wetbond (pulpdent, usa), g-cem (gc, japan) and to assess the bonding performance of these self-adhesive resin cements for bonding of orthodontic brackets. materials and methods: for fluoride release experiment, six ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهرکرد - دانشکده ادبیات و علوم انسانی 1389

current studies in second language (l2) learning have revealed the positive role of corrective feedback (cf) in both oral and written forms in different language features. the present study was an attempt to investigate the effect of both direct and indirect written corrective feedback (wcf) on the use of grammatical collocations in l2 writing. the study also sought to examine whether the effec...

2009
Robert B. Griffiths

⋆ Group: (G, γ) where G is a set and γ a binary operation γ : G×G → G. If γ is clear from the context the group is simply denoted by G. ◦ In place of γ(f, g) write fγg or simply fg when there is no ambiguity, as in most of what follows. ◦ Example: G = Z = {. . .− 2,−1, 0, 1, 2 . . .}, γ = +, γ(f, g) = f + g. • For G to be a group three conditions must be satisfied: (i) γ is associative: γ(f, γ(...

2014
Jianfei Wang Cailing Gao Sung Guen Kim

and Applied Analysis 3 In contrast to the modified Roper-Suffridge extension operator in the unit ball, it is natural to ask if we can modify the Roper-Suffridge extension operator on the Reinhardt domains. In this paper, we will introduce the following modified operator: F z ⎛ ⎝f z1 f ′ z1 n ∑ j 2 ajz pj j , ( f ′ z1 2z2, . . . , ( f ′ z1 nzn ⎞ ⎠ ′ 1.5 on the Reinhardt domainΩn,p2,...,pn . Wew...

1997
Elena Panteley

In this short paper we deal with the stability analysis problem of non-autonomous non-linear systems, in cascade. In particular we give suucient conditions to guarantee that: (i) a globally uniformly stable (GUS) nonlinear time-varying (NLTV) system remains GUS when it is perturbed by the output of a globally uniformly asymptotically stable (GUAS) NLTV system, under the assumption that the pert...

Journal: :Eur. J. Comb. 2004
Amy Glen

This article is concerned with characteristic Sturmian words of slope α and 1−α (denoted by cα and c1−α respectively), where α ∈ (0, 1) is an irrational number such that α = [0; 1 + d1, d2, . . . , dn] with dn ≥ d1 ≥ 1. It is known that both cα and c1−α are fixed points of non-trivial (standard) morphisms σ and σ̂, respectively, if and only if α has a continued fraction expansion as above. Accor...

2004
LAN CHENG XINFU CHEN JOHN CHADAM DAVID SAUNDERS

In this paper, we study the inverse first-crossing problem. This problem originates from the Merton’s structural model [7] for credit risk management, derived as follows. Consider a company whose asset value and debt at time t ≥ 0 are denoted by A(t) and D(t) respectively. Assume the following: (1) D(0) ≤ A(0) and the company is in default at a time t > 0 if A(t) < D(t). (2) {A(t)} is a log-nor...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه کاشان - دانشکده علوم انسانی 1389

abstract this study aimed at analyzing a corpus of emails gathered from iranian students studying in england. the corpus contained 996 emails that were investigated by employing the framework of chen (2006) to find common patterns in the discourse of these emails. another aim of the study was to find how two request acts (want statements and query preparatory) were used in the emails. the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید