نتایج جستجو برای: as a similar approach

تعداد نتایج: 14124321  

پایان نامه :دانشگاه بین المللی امام خمینی (ره) - قزوین - دانشکده مهندسی معماری و شهرسازی 1388

nowadays,tourism industry considered as one of the main sources of income of a country.unfortunately and despite of owning plenty of cultural historical and natural attractions, iran has not reached to a proper position in this field. besides, the historical cities of a country are considered as the income resource and national wealth of it. qazvin with a rich cultural precedent, have suitable ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم پایه 1392

a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...

پایان نامه :0 1374

what miller wants is a theatre of heightened consciousness. he speaks of two passions in a man, the passion to "feel" and the passion "know". he belives that we can have more of the latter. he says: drama is akin to the other inventions of man in that it ought to help us know more and not merely to spend our feelings. the writing of the crucible shows us that he is trying to give more heightene...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1390

any change in the refractive index of a laser active medium can lead to serious degradation of beam quality, laser beam modes, laser performance and variation in the intensity distribution. alteration in the refractive index of laser active medium is especially notable in high power lasers. it is clear that in the laser beam production, the pumping agent induces a great amount of heat which...

Journal: :AI Magazine 1995
Martha E. Pollack

Within the past three years, several new AI textbooks have been published, all written by well-known researchers (Dean, Allen, and Aloiminos 1995; Russell and Norvig 1995; Shoham 1994; Ginsberg 1993). Thus, it is not surprising that the authors of each of these textbooks have sought a way to distinguish their own book from the rest. The hook for Stuart Russell and Peter Norvig's new textbook, A...

2006
Maria Lencastre Keldjan Alves Renata Cristina Faray Melo Fernanda M. R. Alencar

Problem Frames and i* are two broadly used approaches that require a good background from the requirements engineering. Both approaches have typical traits that fit in equivalent. On the other hand, there are features that do not fit. Thereby, there are some points which need improvements on both of them. This work analyzes the five basic problem frames, defined by Michael Jackson, in the i* co...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1393

this thesis attempts to measure learning styles, self efficacy and intrinsic motivation as predictors of iranian ielts reading comprehension. in order to address this issue, a quantitative study was conducted on some randomly selected intact students at ferdowsi university. these two groups were assigned as they were undergraduate (ba=91) and graduate (ma =74) students; they were all aged betwe...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

hedging is a multi-purpose rhetorical strategy which is usually used in scientific arguments to secure ratification of claims, reduce the risk of negation, avoid conflict, manage disagreement and leave room for the audience to assess presented information. hedges are frequently used in research articles to mitigate the findings of research endeavors. the present research aims to investigate the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان - دانشکده علوم پایه 1389

abstract part one: the electrode oxidation potentials of a series of eighteen n-hydroxy compounds in aqueous solution were calculated based on a proper thermodynamic cycle. the dft method at the level of b3lyp-6-31g(d,p) was used to calculate the gas-phase free energy differences ,and the polarizable continuum model (pcm) was applied to describe the solvent and its interaction with n-hydroxy ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید