نتایج جستجو برای: and vi hybrid methods the stochastic method begins with the specification of the fourier spectrum of ground motion as a function of magnitude and distance the acceleration spectrum is modeled by a spectrum with a ω2 shape
تعداد نتایج: 27145777 فیلتر نتایج به سال:
muhammad ibn muhammad ibn numan, known as "shaykh mufid," one of the great imamiye theologians and jurists in the fourth and early fifth century , had comprehensive mastery of both rational and traditional topics and exerted his influence upon both his contemporary and future scholors. he is considered to be one of the top imamiye scholars who spent his lifetime teaching, learning and authorin...
a one dimensional dynamic model for a riser reactor in a fluidized bed catalytic cracking unit (fccu) for gasoil feed has been developed in two distinct conditions, one for industrial fccu and another for fccu using various frequencies of microwave energy spaced at the height of the riser reactor (fccu-mw). in addition, in order to increase the accuracy of component and bulk diffusion, instanta...
cohesion is an indispensable linguistic feature in discourse analysis. lexicald such a differe cohesion and conjunction in particular as two crucial elements to textual cohesion and comprehension has been the focus of a wide range of studies up to now. yet the relationship between the open register and cohesive devices has not been thoroughly investigated in discourse studies. this study concen...
abstract cooperative learning refers to small groups of learners working together as a team to solve a problem, complete a task, or accomplish a common goal. in a cooperative environment one’s success is directly related to the success of other members because the focus on the individual shifts towards the group. to test the effectiveness of the method, using jigsaw technique, a study was cond...
the purpose of the present study was to investigate the effect of task-based instruction of vocabulary on the receptive and oral productive acquisition of english vocabulary and compare the results with those obtained from the traditional method. the method and procedure applied in this study was as follows: after the implementation of opt, a group of sixty female students were chosen. the stu...
a phase-locked loop (pll) based frequency synthesizer is an important circuit that is used in many applications, especially in communication systems such as ethernet receivers, disk drive read/write channels, digital mobile receivers, high-speed memory interfaces, system clock recovery and wireless communication system. other than requiring good signal purity such as low phase noise and low spu...
even though, to date, a lot of studies have been conducted on the subject of politeness theory, there are very few studies regarding the applicability of this theory to translation between english and persian which shows the reason behind conducting the present study. this study was carried out with the aim of highlighting whether there is any difference between english and persian methods of u...
we have two part in this thesis, at first: the interaction of native calf thymus dna (ct-dna) with two anthraquinones including quinizarin (1,4- dihydroxy anthraquinone) and danthron (1,8- dihydroxy anthraquinone) in a mixture of 0.04 m brittone-robinson buffer and 50% of ethanol were studied at physiological ph by uv-vis absorption, florescence, circular dichroism spectroscopic methods, viscos...
dendrimer synthesis strategies now provide virtual control of macromolecular nanostructures as a function of size and surface/interior functionality. these strategies involve the covalent assembly of hierarchical components reactive monomers , branch cells or dendron’s around atomic or molecular cores according to divergent/convergent dendrite branching principles.combinon of two or more dendri...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید