NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

31 32 33
zadetkov: 330
321.
  • MAGIC MOORE-PENROSE INVERSE... MAGIC MOORE-PENROSE INVERSES AND PHILATELIC MAGIC SQUARES WITH SPECIAL EMPHASIS ON THE DANIELS–ZLOBEC MAGIC SQUARE
    Chu, Ka Lok; Drury, S. W; Styan, George P. H ... Croatian Operational Research Review, 02/2011, Letnik: 2, Številka: 1
    Paper
    Odprti dostop

    We study singular magic matrices in which the numbers in the rows and columns and in the two main diagonals all add up to the same sum. Our interest focuses on such magic matrices for which the ...
Celotno besedilo
322.
  • STUDY ON THE PLANNING METHO... STUDY ON THE PLANNING METHOD OF ECHIZEN OHNO CASTLE TOWN : Study on the town planning method of the castle town (Part 1)
    TAMAKI, Shingo Journal of Architecture and Planning (Transactions of AIJ), 1995/10/30, Letnik: 60, Številka: 476
    Journal Article
    Odprti dostop

    This paper aims to identify the method of town planning in the Japanese castle town in the age of civil wars, about A. D. 1600. The conclusions are as follows, 1. The town plannings in the age of ...
Celotno besedilo
323.
  • Two efficient edge detectin... Two efficient edge detecting operators derived from 3 × 3 magic squares
    Zhao-Xue Chen; Sheng-Dong Nie 2007 International Conference on Wavelet Analysis and Pattern Recognition, 2007-Nov., Letnik: 2
    Conference Proceeding

    Two efficient edge-detecting operators are introduced. They are both based on templates derived from a 3 x 3 magic square, one operator can obtain edge gradient map with more continuous histogram, ...
Celotno besedilo
324.
  • Image encryption algorithm ... Image encryption algorithm based on chaotic system
    Jiu-Lun Fan; Xue-Feng Zhang 2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design, 2006-Nov.
    Conference Proceeding

    Traditional permutation encryption algorithm is not robustness for noise disturbing and shear transformation attacks. In order to ameliorate the security of image encryption algorithm, we present an ...
Celotno besedilo
325.
Celotno besedilo

PDF
326.
Celotno besedilo

PDF
327.
  • Quantitative Analyse der Auswirkungen wirtschaftspolitischer Massnahmen auf die Einkommensverteilung und das «neue magische Viereck» in der Schweiz
    Hartwig, Jochen 2004/08 4
    Paper

    Macroeconometric policy simulation models allow for an analysis, and, above all, for a quantification of the effects different economic policies have on the various variables that represent the ...
Preverite dostopnost
328.
Celotno besedilo
329.
  • Mathematics Education with ... Mathematics Education with Mathematica
    Ueno, Yoshiaki Computer & Education, 1998/11/30, Letnik: 5
    Journal Article
    Odprti dostop

    By the introduction of computers, the conventional style of mathematics education, which put stress, most exclusively, on training in accurate calculation, will come to an end. In a new classroom ...
Celotno besedilo
330.
  • 数学教育とMathematica 数学教育とMathematica
    植野, 義明 コンピュータ&エデュケーション, 1998, Letnik: 5
    Journal Article
    Odprti dostop

    コンピュータの導入によって、正確な計算の訓練だけに重点が置かれすぎていたこれまでの数学教育の形態は終焉を告げるだろう。新しい教室環境の下では、仮説を立て、実験を行い、検証するという数学本来の楽しさを、教師も生徒もいっしょになって体験できる。そのような活動のためのひとつの教材例として、この論文では日本の伝統数学から魔方陣を取り上げた。
Celotno besedilo
31 32 33
zadetkov: 330

Nalaganje filtrov