نتایج جستجو برای: specific searching efficiency

تعداد نتایج: 1435137  

2004
Simon G. M. Koo C. S. George Lee Karthik Kannan

The research focus of Peer-to-Peer (P2P) network design had long been on low-complexity content mapping and efficient search mechanisms. System such as CAN, Chord, Pastry are pioneers in the area and have been cited by almost every P2P work. These systems provide an efficient substrate for sharing/distributing small files like MP3 or images, because searching time is essential to the overall pe...

2006
Simon G. M. Koo

The research focus of Peer-to-Peer (P2P) network design had long been on low-complexity content mapping and efficient search mechanisms. System such as CAN, Chord, Pastry are pioneers in the area and have been cited by almost every P2P work. These systems provide an efficient substrate for sharing/distributing small files like MP3 or images, because searching time is essential to the overall pe...

2008
A. Galindo

We introduce the concepts of Grover operators and Grover kernels to systematically analyse Grover’s searching algorithms. Then, we investigate a one-parameter family of quantum searching algorithms of Grover’s type and we show that the standard Grover’s algorithm is a distinguished member of this family. We show that all the algorithms of this class solve the searching problem with an efficienc...

Journal: :Current Opinion in Electrochemistry 2021

Electrochemical lithium extraction methods have recently attracted significant attention as alternatives to the currently employed techniques. A considerable effort has been made develop this technology, especially in searching Li-ion selective electrodes. However, much less paid counter In general, these materials used counterparts without considering their influence global method. This review...

Journal: :Science China Physics, Mechanics & Astronomy 2021

Searching for compact objects (black holes, neutron stars, or white dwarfs) in the Milky Way is essential understanding stellar evolution history, physics of objects, and structure our Galaxy. Compact binaries with a luminous companion are perfect targets optical observations. Candidate can be achieved by monitoring radial velocities star. However, most spectroscopic telescopes usually obtain s...

Journal: :نامه انجمن حشره شناسی ایران 0
زهرا تازرونی department of entomology, college of agriculture, tarbiat modares university, p. o. box 14115-336, tehran, iran علی اصغر طالبی department of entomology, college of agriculture, tarbiat modares university, p. o. box 14115-336, tehran, iran یعقوب فتحی پور department of entomology, college of agriculture, tarbiat modares university, p. o. box 14115-336, tehran, iran محمود سوف باف agricultural, medical and industrial research school, p. o. box 31485/498, karaj, iran

the cotton aphid, aphis gossypii glover is a major pest of greenhouse cucumber in the world. in this study, age specific functional response of aphidius matricariae haliday and praon volucre (haliday) were investigated on a. gossypii at 25±1°c, 60±5% rh and a photoperiod of 14 l: 10 d h. the results showed that the functional response of a. matricariae was type iii during 1st, 2nd, 3rd, 4th and...

Journal: :کنترل بیولوژیک آفات و بیماری های گیاهی 0
نجمه علی محمدی داورانی دانشجوی سابق کارشناسی ارشد محمدامین سمیع استادیار گروه گیاهپزشکی، دانشکده کشاورزی، دانشگاه ولی عصر رفسنجان حمزه ایزدی استادیار گروه گیاهپزشکی، دانشکده کشاورزی، دانشگاه ولی عصر رفسنجان

common pistachio psylla, agonoscena pistaciae burckardt and lauterer (hemiptera: aphalaridae) is one of the economical pest among the pistachio orchards. the adonis' ladybird, hippodamia variegata (goeze) (col: coccinellidae) is one of the most prominent coccinellid predator in pistachio orchards. it is omnivorous and feed on aphids and psylla. functional response studies using a suitable ...

2000
Adam L. Buchsbaum Michael T. Goodrich Jeffery Westbrook

We introduce the tree cross-product problem, which abstracts a data structure common to applications in graph visualization, string matching, and software analysis. We design solutions with a variety of tradeoffs, yielding improvements and new results for these applications.

2013
S. Evangeline Sharon N. Saravanan

To ensure security, encryption techniques play a major role when data are outsourced to the cloud. Problem of retrieving the data from the cloud servers is considered. Many searching techniques are used for retrieving the data. This study focused on a set of keyword based search algorithms. It provides secure data retrieval with high efficiency. It concludes Ranked Searchable Symmetric Encrypti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید