نتایج جستجو برای: nicolsons scheme

تعداد نتایج: 222639  

Journal: :bulletin of the iranian mathematical society 2011
a. razani h. salahifard

Journal: :journal of agricultural science and technology 2015
m. sattaei mokhtari s. r. miraei-ashtiani m. jafaroghli j. p. gutierrez

studbook information collected from 1988 to 2011 in jafarabad breeding station of moghani sheep, north-west of iran, related to 9,457 lambs were used to study the genetic diversity and to evaluate the effectiveness of an implemented rotational mating scheme using pedigree analysis. lambs born during 2009-2011 were considered as reference population. means inbreeding and average coancestry for t...

Journal: :iranian journal of parasitology 0
azzam afifi abdel-aziz a. ahmed yassir sulieman theerakamol pengsakul

background: schistosomiasis is one of the major communicable diseases of public health and socioeconomic importance in developing countries. this study assessed the situation of schistosomiasis among villagers of the new halfa agricultural scheme, sudan. methods: an epidemiological survey was carried out in three randomly selected residential sites: village 19, village 26 and talat shagrat camp...

To achieve higher economy of the original driving scheme with single motor and settled gear ratio, new configurations with different powertrain systems in front and rear axle were designed. Firstly, according to the power and torque required by a micro electric vehicle (mEV) in various drive cycles, the parameters of a small and high power motor were determined. Secondly, for schemeⅠwith dual m...

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

Background Ghana’s National Health Insurance Scheme (NHIS), established by an Act of Parliament (Act 650), in 2003 and since replaced by Act 852 of 2012 remains, in African terms, unprecedented in terms of growth and coverage. As a result, the scheme has received praise for its associated legal reforms, clinical audit mechanisms and for serving as a hub for knowledge sharing and learning within...

The main objective of steganography is to conceal a secret message within a cover-media in such a way that only the original receiver can discern the presence of the hidden message. The cover-media can be a text, email, audio, image, and video, which can be transmitted through a public channel, such as the Internet. By extending the use of email among Internet users, the provision of email steg...

Journal: :computational methods for differential equations 0
hammad khalil university of malakand rahmat khan university of malakand m. m. rashidi shanghai key lab of vehicle aerodynamics and vehicle thermal management systems, tongji university.

the paper is devoted to the study of brenstien polynomials and development of some new operational matrices of fractional order integrations and derivatives. the operational matrices are used to convert fractional order differential equations to systems of algebraic equations. a simple scheme yielding accurate approximate solutions of the couple systems for fractional differential equations is ...

Journal: :isecure, the isc international journal of information security 0
a. mortazavi sharif university of technology m. salmasizadeh sharif university of technology a. daneshgar sharif university of technology

a non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. the main idea behind nonmalleable coding is that the adversary should not be able to obtain any valuable information about the message. non-malleablecodes are used in tamper-resilient cryptography and protecting memories against tampering attacks. many different types of nonmalleability have already...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید