نتایج جستجو برای: has particular features like priority

تعداد نتایج: 3729292  

Let $R$ be a commutative ring with identity and $M$ be a unitary$R$-module. The primary-like spectrum $Spec_L(M)$ is thecollection of all primary-like submodules $Q$ such that $M/Q$ is aprimeful $R$-module. Here, $M$ is defined to be RSP if $rad(Q)$ isa prime submodule for all $Qin Spec_L(M)$. This class containsthe family of multiplication modules properly. The purpose of thispaper is to intro...

Journal: :إضاءت نقدیه فی الأدبین العربی و الفارسی 0
عباس اقبالی أستاذ مشارک فی اللغة العربیة وآدابها بجامعة کاشان، کاشان، إیران فائزه پسندی دانشجوی دکتری زبان و ادبیات عربی دانشگاه کاشان، کاشان، ایران

abundance of skillful poetesses in ode writing is one of the features of literature history during andulus era. hence, a great deal of andalusian poems appertain to poetesses; the poems are of features like delicacy, accuracy, elegance and development. this is clear that the basic characteristics of such poetic experience is derived from poetess's skill in representing ancient meanings wit...

قریشی زاده, سید محمد علی ,

Psychiatric disorders are very prevalent in epilepsy, 30 to 50 percent of epileptic patients suffer from psychiatric problems. On the other hand, many psychiatric disorders such as dissociative disorder, sleep disorder, impulse control disorder and cyclic disorders have clinical features like epilepsy. Therefore, differential dagnosis is very important in dealing with epilepsy. Epilepsy has man...

Background: Contagious ecthyma or orf is a poxviral disease of goat and sheep, with incidental infection appearing in humans, cows, camels, and many wild ruminants, and very rarely in dogs. Case description: In the present paper was described gross morphology and histopathology of contagious ecthyma in a dog with a large ulcerated cutaneous mass in the neck (under the collar) which was ma...

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

2003
Michael Gasser Eliana Colunga

In this statement, we discuss two kinds of properties that a grounded model of the learning of word meaning should have, those related to the way in which linguistic and non-linguistic processing should interact and those related to the representational demands placed on such a model. We also introduce Playpen (Gasser & Colunga 1997) a neural network architecture with these properties. Playpen ...

Journal: :International Journal of Database Theory and Application 2016

2009
Thomas Beckers Ingo Frommholz Ralf Bönning

Helpdesks have to manage a huge amount of support requests which are usually submitted via e-mail. In order to be assigned to experts efficiently, incoming e-mails have to be classified w. r. t. several facets, in particular topic, support type and priority. It is desirable to perform these classifications automatically. We report on experiments using Support Vector Machines and k-Nearest-Neigh...

M. Mohammadzadeh S.S. Mousavi

Spatial-temporal modeling of air pollutants, ground-level ozone concentrations in particular, has attracted recent attention because by using spatial-temporal modeling, can analyze, interpolate or predict ozone levels at any location. In this paper we consider daily averages of troposphere ozone over Tehran city. For eliminating the trend of data, a dynamic linear model is used, then some featu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید