نتایج جستجو برای: key word

تعداد نتایج: 651123  

Journal: :iranian rehabilitation journal 0
elham masumi department of speech therapy, faculty of rehabilitation, iran university of medical sciences, nezam alley, shahid shahnazari st., madar square, mirdamad blvad., tehran,iran. zohre arani kashani department of speech therapy, faculty of rehabilitation, iran university of medical sciences, nezam alley, shahid shahnazari st., madar square, mirdamad blvad., tehran,iran. ali ghorbani department of speech therapy, faculty of rehabilitation, iran university of medical sciences, nezam alley, shahid shahnazari st., madar square, mirdamad blvad., tehran,iran. mohammad kamali department of speech therapy, faculty of rehabilitation, iran university of medical sciences, nezam alley, shahid shahnazari st., madar square, mirdamad blvad., tehran,iran.

objectives: stuttering is one of the most prevalent speech and language disorders. symptomology of stuttering has been surveyed from different aspects such as biological, developmental, environmental, emotional, learning and linguistic. previous researches in english-speaking people have suggested that some linguistic features such as word meanings may play a role in the frequency of speech non...

2016
Vít Baisa Silvie Cinková Ema Krejcová Anna Vernerová

We present VPS-GradeUp – a set of 11,400 graded human decisions on usage patterns of 29 English lexical verbs from the Pattern Dictionary of English Verbs by Patrick Hanks. The annotation contains, for each verb lemma, a batch of 50 concordances with the given lemma as KWIC, and for each of these concordances we provide a graded human decision on how well the individual PDEV patterns for this p...

2009
Hoi-Kwong Lo H. F. Chau M. Ardehali

We devise a simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme proposed by Bennett and Brassard. We also prove the security of our modified scheme against the most general eavesdropping attack that is allowed by the laws of physics. The first major ingredient of our scheme is the assignment of significantly different probabilities to the diff...

1998
Mohammad Ardehali Gilles Brassard H. F. Chau

We devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in ...

2005
Vahid Karimipour

We introduce a generalization of Hadamard and the controlled not gates which together with the generalized Bell states, enable us to introduce new methods for quantum key distribution (QKD) of d-level quantum states (qudits). In case of eavesdropping, an error rate of d−1 d is introduced in Bob’s received qudits, so that for large d, comparison of only a tiny fraction of received qudits with th...

2013
Masakazu Yoshida Takayuki Miyadera Hideki Imai

Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but...

2016
Domagoj Alagic Jan Snajder

We introduce Cro36WSD, a freely-available medium-sized lexical sample for Croatian word sense disambiguation (WSD). Cro36WSD comprises 36 words: 12 adjectives, 12 nouns, and 12 verbs, balanced across both frequency bands and polysemy levels. We adopt the multi-label annotation scheme in the hope of lessening the drawbacks of discrete sense inventories and obtaining more realistic annotations fr...

Journal: :Journal of child language 2003
Michèle M Mazzocco Gwen F Myers Laurie A Thompson Sneha S Desai

This study was designed to examine factors associated with literal interpretations of homonyms. Participants were 212 second graders, ages 7;0-8;11, who listened to a story containing 16 key words. The key words were homonymous words ('pseudo-homonyms'), nonsense words, or familiar words used accurately. While listening to the story, children selected an illustration of each key word. Later, th...

2002

Pervasive secure computing paradigms in the publicly interconnected world pose new challenges in the architecture of future general-purpose processors. These paradigms include safer communications, storage and execution. Basic security functions like confidentiality, data integrity and user authentication can be achieved by symmetric-key, hash and public-key cryptography algorithms, respectivel...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید