Go and mathematics

Results: 146



#Item
61Shape / Pattern / Mathematics / Structure / Childhood / Go / Child development

Personal, Social, and Emotional Development KS1 POS Recognise and name body parts Recognise weather changes and appropriate clothing Observe similarities between self and baby

Add to Reading List

Source URL: www.primaryresources.co.uk

Language: English - Date: 2010-01-22 02:41:37
62Analytic functions / Trigonometry / Functions and mappings / Trigonometric functions / Complex number / Integral / Vector space / Calculus / Derivative / Mathematics / Mathematical analysis / Algebra

<4D6963726F736F667420576F7264202D2090948A7783568389836F835889FC92F994C581698970816A2E646F63>

Add to Reading List

Source URL: www.jasso.go.jp

Language: English - Date: 2014-03-31 03:06:49
63Analytic functions / Trigonometry / Functions and mappings / Trigonometric functions / Integral / Vector space / Complex number / Calculus / Derivative / Mathematics / Mathematical analysis / Algebra

Syllabus for EJU Subject Examinations (Basic Scholastic Ability)< Mathematics>

Add to Reading List

Source URL: www.jasso.go.jp

Language: English - Date: 2011-09-09 22:01:51
64Mathematics / Office equipment / Scientific calculator / Graphing calculator / Media technology / SAT / HP calculators / SAT Subject Test in Mathematics Level 2 / Calculators / Programmable calculators / Technology

HP 10s Scientific Calculator This scientific solar calculator is perfect for mathematics and science courses. Simple-to-use and designed to go with you as your challenges grow, the HP 10s takes on

Add to Reading List

Source URL: www.curtin.edu.my

Language: English - Date: 2009-02-04 20:49:53
65Arithmetic coding / Information theory / Code / Shannon–Fano–Elias coding / Australian National University / Go / Algorithm / Academia / Mathematics / Applied mathematics / Huffman coding

COMP2610[removed]Information Theory Lecture 15: Arithmetic Coding NU Logo UseMarkGuidelines Reid and Aditya Menon

Add to Reading List

Source URL: mark.reid.name

Language: English - Date: 2015-03-10 00:10:59
66IP traceback / Internet / Information / Data transmission / Denial-of-service attacks / Denial-of-service attack / Router / Communications protocol / Transmission Control Protocol / Computing / Computer network security / Data

2-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System SUZUKI Ayako, OHMORI Keisuke, MATSUSHIMA Ryu, KAWABATA Mariko, OHMURO Manabu, KAI Toshifumi, and NISHIYAMA Shigeru IP traceback is a techn

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:56:56
67Group theory / Decisional Diffie–Hellman assumption / Pseudorandom generator theorem / Order / Commitment scheme / Probabilistic encryption / XTR / Sylow theorems / Abstract algebra / Cryptography / Mathematics

3 Countermeasures Against Information Leakage 3-1 Subgroup Membership Problem and Its Applications to Information Security YAMAMURA Akihiro and SAITO Taiichi The widely used algorithmic problems, the quadratic residue pr

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:57:32
68Automata theory / Asynchronous cellular automaton / Nanocircuitry / Digital electronics / Mathematics / Electronics / Theory of computation / Block cellular automaton / Cellular neural network / Cellular automata / Ferdinand Peper / Cellular automaton

4-5 Nanoelectronics Architectures Ferdinand Peper, LEE Jia, ADACHI Susumu, ISOKAWA Teijiro, TAKADA Yousuke, MATSUI Nobuyuki, and MASHIKO Shinro The ongoing miniaturization of electronics will eventually lead to logic dev

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:53:45
69Applied mathematics / Electromyography / Overcompleteness / Blind deconvolution / Deconvolution / Blind signal separation / Neuron / Posture / Signal processing / Medicine / Mathematics

4 Social Interaction 4-1 Basic Study for Cognition and Manipulation of the Body Image MAEKAWA Satoshi In recent years, it becomes clear that the body image is not inherent, but have plasticity. This fact suggests that th

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2007-12-11 08:56:34
70Theoretical computer science / Applied mathematics / Error detection and correction / Quantum key distribution / Computer arithmetic / Cryptographic hash function / Hash function / Hamming / MD5 / Cryptography / Quantum information science / Quantum cryptography

3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. O

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:58:38
UPDATE