نتایج جستجو برای: made check
تعداد نتایج: 519428 فیلتر نتایج به سال:
Fingerprinting is a well known technique, which is often used in designing Monte Carlo algorithms for verifying identities involving matrices, integers and polynomials. The book by Motwani and Raghavan [1] shows how this technique can be applied to check the correctness of matrix multiplication – check if AB = C where A,B and C are three n×n matrices. The result is a Monte Carlo algorithm runni...
Recently, several approaches have been developed to check process models for compliance with laws and regulations. In this paper a contribution is made with respect to reducing the complexity of compliance checking by partially automating business process compliance (BPC) checking. We present a model checking approach that is able to check process models for BPC. In particular, we apply a gener...
The i* Framework has been regarded as a suitable organizational modeling approach for representing early requirements of complex software systems. Intentionality in organizational context is the aim of i* Framework. We believe that a general lack of awareness about the i* language is the main reason for some authors mistakes including the lack of focus on intentionality. Aiming to help changing...
Checking the regularity of the inverse jacobian matrix of a parallel robot is an essential element for the safe use of this type of mechanism. Ideally such check should be made for all poses of the useful workspace of the robot or for any pose along a given trajectory and should take into account the uncertainties in the robot modeling and control. We propose various methods that facilitate thi...
teacher questions are claimed to be constitutive of classroom interaction because of their crucial role both in the construction of knowledge and the organization of classroom proceedings (dalton puffer, 2007). most of previous research on teachers’ questions mainly focused on identifying and discovering different question types believed to be helpful in creating the opportunities for learners’...
The focus of this study is to develop a novel method of encoding the qubits and use as secret key in public key cryptography. In BB 84 protocol, 50% of the random number (generated at source) is used as secret key and the remaining bits are used as “check bits”. The check bits are used to detect the presence of eve as well as the nature of quantum channels. In this protocol, random qubits are e...
A new method is developed to measure the contact angle of air bubbles attached to an air-water interface. The measurements made from the microscopic interference pattern (Newton rings), which are obtained by viewing the bubble in reflected light, are used in conjunction with the solutions of the Laplace equations to the fluid interfaces to obtain the contact angle of the film. Measurements made...
We check claims for a generalized central limit theorem holding at the Feigenbaum (infinite bifurcation) point of the logistic map made recently by Tirnakli, Phys. Rev. 75, 040106(R) (2007); this issue, Phys. Rev.79, 056209 (2009). We show that there is no obvious way that these claims can be made consistent with high statistics simulations. Instead, we find other scaling laws for related quant...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید