نتایج جستجو برای: we choose a suitable scheme

تعداد نتایج: 13743735  

2001
Mike Burmester Yvo Desmedt Rebecca Wright Alec Yasinsac

Hardly a day passes without reports of new threats in or about the Internet. Denial of service, worms, viruses, spam, and divulged credit card information highlight the major security threats. At the same time, we are bombarded by reports that privacy is at the greatest risk of all time, caused by the massive ability to store and search information and to trace activities across the Internet. I...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ولی عصر (عج) - رفسنجان - دانشکده ریاضی و کامپیوتر 1389

in this thesis we will present three topics. we define approximate fixed points in fuzzy normed spaces. also we obtain some necessary and sufficient conditions on the existence of? -fixed points for ? > 0. at the continue some results about approximate fixed points for a class of non-expansive maps on g-metric spaces are obtained and we define approximate fixed points in partial metric spa...

2017
Sol M. Gruner James S. Langer Philip C. Nelson Viola Vogel

Science in the United States is in a time of pain and uncertainty. The pain is felt most acutely by young scientists, who are having great difficulty establishing their careers. The uncertainty about the duration and outcome of the current situation stems from its roots in ponderous events of recent history—the end of the cold war, industrial downsizing, government deficits and demographic tren...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده ریاضی و کامپیوتر 1389

the concepts of similarity and dissimilarity have been the interest of many researchers. basically, in the studies the similarity between two objects or phenomena, has been discussed. in this thesis, we consider the case when the resemblance or similarity among three objects or phenomena of a set, 3-similarity in our terminology, is desired. later we will extend our definitions and propos...

2000
Subhasish Mitra Edward J. McCluskey

Concurrent error detection (CED) techniques (based on hardware duplication, parity codes, etc.) are widely used to enhance system dependability. All CED techniques introduce some form of redundancy. Redundant systems are subject to common-mode failures (CMFs). While most of the studies of CED techniques focus on area overhead, few analyze the CMF vulnerability of these techniques. In this paper...

Journal: :Journal of managed care pharmacy : JMCP 2007
Neil B Minkoff

BACKGROUND As preventive medicine is a cornerstone of managed care, most health plans have traditionally featured automatic vaccine coverage routed through the medical benefit. However, with the advent of emerging vaccines, managed care stakeholders must revise decision-making processes and choose among multiple products targeting the same disease. OBJECTIVE To review the motivating forces be...

Journal: :Quality and Safety in Health Care 1996

Journal: :European Journal of Public Health 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید