نتایج جستجو برای: namely kheirabad

تعداد نتایج: 164189  

Risk management is one of the most important phases of project management and isthe most recently used by many researchers. In this paper, a fuzzy based method wasproposed which identifies different kinds of risks through the project life cycle.Then, the project risk magnitude can be obtained in regards to five factors, namely“severity”, “occurrence”, and “not detection” which form fuzzy FMEA a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم انسانی 1392

the main purpose of the present study was to investigate the relationship between listening proficiency and metacognitive listening strategies awareness among low, mid, and highly self-regulated students. three hundred and seventy one efl students participated in this study (all grade 3 and 4 high-school students who were studying in khansar in academic year 1391-92). to gather the data, three ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده ادبیات و زبانهای خارجی 1392

abstract i the purpose of this study was to launch a thorough investigation concerning the possibility of differing orientations to the writing proficiency construct by native and non-native english speaking teacher raters. it mainly revolved around the international english language testing system (ielts) that is widely administered and employed as a measure of general proficiency in englis...

J. Thanusu M. Gopalakrishnan V. Kanagarajan

In a search for new leads towards potent antimicrobial agents, an array of novel (2E)-ethyl-2-(2-(2,4-dinitrophenyl)hydrazono)-4-(naphthalen-2-yl)-6-arylcyclohex-3-ene carboxylates 17-24 were synthesized and characterized through their melting point, elemental analysis, MS, FT-IR, one-dimensional NMR (1H, D2O exchanged 1H and 13C), two dimensional HOMOCOR and HSQC spectroscopic data. In-vitro m...

2009
Reza Reyhanitabar Willy Susilo Yi Mu

Two of the most recent and powerful multi-property-preserving (MPP) hash domain extension transforms are the Ramdom-Oracle-XOR (ROX) transform and the Enveloped Shoup (ESh) transform. The former was proposed by Andreeva et al. at ASIACRYPT 2007 and the latter was proposed by Bellare and Ristenpart at ICALP 2007. In the existing literature, ten notions of security for hash functions have been co...

In this paper we introduce and study an algebraic structure, namely Grouplike. A grouplike is something between semigroup and group and its axioms are generalizations of the four group axioms. Every grouplike is a semigroup containing the minimum ideal that is also a maximal subgroup (but the converse is not valid). The first idea of grouplikes comes from b-parts and $b$-addition of real number...

In the present study, the effective parameters of water-Al2O3 nanofluid flowing in flat tubes are investigated using the EFAST Sensitivity Analysis (SA) method. The SA is performed using GMDH type artificial neural networks (ANN) which are based on validated numerical data of two phase modeling of nanofluid flow in flat tubes. There are five design variables namely: tube flattening (H), flow ra...

2008
Janetta H Roos

The purpose of this article was to explain and describe how professional nurses in the health services experience difficult patients. A qualitative, descriptive research design was adopted. Data were collected by means of narratives, written by professional nurses who met the sampling criteria. The data analysis was done according to the protocol suggested by Tesch. Four major categories were i...

2014
A.Suhirtha Subha Rahila Bilal

Elliptic Curve Cryptography plays a vital role in securing the information for the past two decades. Implementing ECC in hardware is more efficient than software. A processor is said to be compact, if its implementation space is small compared to its execution speed and is scalable if this processor is used with different key sizes. Different metrics such as execution time, implementation space...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید