نتایج جستجو برای: s identity
تعداد نتایج: 820096 فیلتر نتایج به سال:
Tor’s Hidden Services allow a server to offer a service anonymously through the Tor network. Hidden Services are associated with an identity key and need to publish descriptors that allow clients to locate introduction points to which the hidden service has already established anonymous circuits. As Biryukov et al. show [2], in the current Hidden Service design, a Tor Node that is in position t...
Recently Zagier proved a remarkable q-series identity. We show that this identity can also be proved by modifying Franklin's classical proof of Euler's pentagonal number theorem.
Beginning with classic Hollywood melodramas of the 1940s, cinema has maintained a prolific output of films with their own take on mental illnesses-none more so than the rare syndrome of dissociative identity disorder (DID). DID films are a popular and enduring genre, whose influence can be seen throughout mainstream cinema. Exploration of DID in cinema is a useful exercise in that it touches on...
Marital satisfaction is one of the most important indicators of life satisfaction in couples, and a higher level of marital satisfaction is related to a better family functioning. Therefore, the goal of this study was to predict marital satisfaction in women based on their identity and love styles. The method of research was correlational. The statistical population included all women working a...
In this note we give examples of a ring that has no maximal ideals. Recall that, by a Zorn’s lemma argument, a ring with identity has a maximal ideal. Therefore, we need to produce examples of rings without identity. To help motivate our examples, let S be a ring without identity. We may embed S in a ring R with identity so that S is an ideal of R. Notably, set R = Z⊕S, as groups, and where mul...
This paper examines Henry Fielding’s 1730 burlesque afterpiece Tom Thumb as a dual narrative performance which seeks to satirise the heroic tragedies of the 1710s and ‘20s while simultaneously presenting itself as a serious contribution to the same genre. The piece thus speaks to two audiences: an imagined audience who accept Tom Thumb as a genuine tragic hero, as well as a real audience who re...
This article presents two expectation identities and a series of applications. One of the identities uses the heat equation, and we show that in some families of distributions the identity characterizes the normal distribution. We also show that it is essentially equivalent to Stein's identity. The applications we have presented are of a broad range. They include exact formulas and bounds for m...
Analysis is given on Hu et al.’s efficient identity-based broadcast encryption (IBBE) scheme published in Journal of Computers, Vol. 5, No. 3, March 2010. Two major flaws are described. One is that valid group members outside the receiver set can still decrypt the ciphertext, which contradicts the authors’ definition for IBBE. The other is that, given a valid private key, it is easy to generate...
Proof. (5.2) implies that the set of permutations is closed under com position of functions. We check the three axioms for a group. We already proved that composition of functions is associative. Let i : S −→ S be the identity function from S to S. Let f be a permutation of S. Clearly f ◦ i = i ◦ f = f . Thus i acts as an identity. Let f be a permutation of S. Then the inverse g of f is a perm...
this study concerns to analyze femininity identity by psychoanalysis approach of lacan. psychoanalysis is certainly one of the most areas of debate within feminist artists. the main question of this research is: “how does video art show the femininity identity?” so, initially we tried to categorize different influential concepts of lacan’s psychoanalysis which is necessary to get to know his at...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید