نتایج جستجو برای: sequence of key polynomials

تعداد نتایج: 21203868  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1376

in chapter 1, charactrizations of fragmentability, which are obtained by namioka (37), ribarska (45) and kenderov-moors (32), are given. also the connection between fragmentability and its variants and other topics in banach spaces such as analytic space, the radone-nikodym property, differentiability of convex functions, kadec renorming are discussed. in chapter 2, we use game characterization...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی و اجتماعی 1388

abstract the present study was conducted to examine the effect of proficiency on students interaction while carrying out the grammar-based task(s) in collaboration. in particular, the study examines whether the level of proficiency affects the learners’ focus of attention to grammatical and lexical features. the study takes a further step and examines whether there is any difference in the use...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - پژوهشکده مهندسی فرایند 1395

abstract: mineral scaling in oil and gas production equipment is one of the most important problem that occurs while water injection and it has been recognized to be a major operational problem. the incompatibility between injected and formation waters may result in inorganic scale precipitation in the equipment and reservoir and then reduction of oil production rate and water injection rate. ...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم انسانی 1390

abstract al- muntazam by ibn al -jawzi is one of the greatest the book ancient book of texts on history of islam in the 6th century.it is very important one;because of including rare reports which are not found any where.in addition to historical reports,his outlook , in which embodies information on mythologies, milal wa nihal (sects and creeds), geography, and political, social and religiou...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

abstract the current study set out to address the issue as to whether the implementation of portfolio assessment would give rise to iranian pre-intermediate efl learner autonomy. participants comprised 60 female in pre-intermediate level within the age range of 16-28.they were selected from among 90 language learners based on their scores on language proficiency test -key english test. then, t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

2012
Lein Harn Guang Gong

In 1992, Blundo et al. have proposed a non-interactive k-secure m-conference protocol based on an m-variate polynomial over a finite field Fp. The key distribution center (KDC) is responsible to pick a symmetric m-variate polynomial of degree k and generate shares for users. Each share is a symmetric polynomial involving m− 1 variables of degree k, and needs to store the coefficients of such a ...

1999
GEORGE BOROS VICTOR H. MOLL

A finite sequence of real numbers {d0, d1, · · · , dm} is said to be unimodal if there exists an index 0 ≤ j ≤ m such that d0 ≤ d1 ≤ · · · ≤ dj and dj ≥ dj+1 ≥ · · · ≥ dm. A polynomial is said to be unimodal if its sequence of coefficients is unimodal. The sequence {d0, d1, · · · , dm} with dj ≥ 0 is said to be logarithmically concave (or log concave for short) if dj+1dj−1 ≤ dj for 1 ≤ j ≤ m − ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1394

the present research was an attempt to see how quranic lexical collocations were translated into english by two professional translators namely, abdullah yusuf(2005), and muhammad s. shakir(2012). the study attempted qualitatively to shed light on how translators dealt with quranic lexical collocations when transferring them to the target language based on the newmark(1988) model , and quantit...

2011
Shazia Afreen Nassar Ikram

The main focus of this paper is to apply suitable combiner function for cryptographic use which possesses multiple cryptographic properties such as balanced, correlation immune and high algebraic degree. Resilient function which is the generalization of correlation immune Boolean function is thus considered. In this paper we presents RFSG, a new sequence generator which uses (q, m+1, m, 1) resi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید