نتایج جستجو برای: computational model

تعداد نتایج: 2278963  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده کشاورزی 1388

چکیده ندارد.

Journal: :transport phenomena in nano and micro scales 0
a. r. rahmati department of mechanical engineering, university of kashan, kashan, i. r.iran r. ehsani department of mechanical engineering, university of kashan, kashan, i. r.iran

because of its kinetic nature and computational advantages, the lattice boltzmann method (lbm) has been well accepted as a useful tool to simulate micro-scale flows. the slip boundary model plays a crucial role in the accuracy of solutions for micro-channel flow simulations. the most used slip boundary condition is the maxwell slip model. the results of maxwell slip model are affected by the ac...

Journal: :روش های عددی در مهندسی (استقلال) 0
محمدرضا بهبهانی فرد m. r. behbahanifard محمدمهدی سعادتپور m.m. saadatpour

a frequency domain dynamic analysis is needed to obtain the response of structures constructed on a system of base isolators on flexible soil when subjected to earthquake ground motion. in such systems, the lateral stiffness of the base isolators is so small, compared to the structural stiffness, that in an earthquake attack the fundamental vibration mode dominates the response. with this in mi...

ژورنال: سلامت و محیط زیست 2013
اشرفی, خسرو , راستی, عمران , نوری, روح­‌اله , هشیاری‌پور, غلامعلی ,

Backgrounds and Objectives: Precise air pollutants prediction, as the first step in facing air pollution problem, could provide helpful information for authorities in order to have appropriate actions toward this challenge. Regarding the importance of carbon monoxide (CO) in Tehran atmosphere, this study aims to introduce a suitable model for predicting this pollutant. Materials and Method: W...

Journal: :international journal of nano dimension 0
s. asadi department of mechanical engineering, payame noor university, tehran, iran.

a novel computational fluid dynamics and molecular kinetic theory (cfd-mk) method was developed to simulate the impingement of a nanodroplet onto a solid surface. a numerical solution of the navier–stokes equation using a volume-of-fluid (vof) technique was used to model nanodroplet deformation. dynamic contact angle during droplet impact was obtained by molecular kinetic theory. this dynamic c...

Journal: :ژورنال بین المللی پژوهش عملیاتی 0
z. rajabi s. avakh darestani

the hierarchical hub location problem is encountered three-level network that is applied in production-distribution system, education system, emergency medical services, telecommunication network, etc. this paper addresses the hierarchical hub covering problem with single assignment accounting for mandatory dispersion of central hubs restriction as a special case. this formulation with incorpor...

A. Salehipour , H. Kazemipoor , M. Aryanezhad, R. Tavakkoli-Moghaddam,

Abstract : A tandem automated guided vehicle (AGV) system deals with grouping workstations into some non-overlapping zones , and assigning exactly one AGV to each zone. This paper presents a new non-linear integer mathematical model to group n machines into N loops that minimizes both inter and intra-loop flows simultaneously. Due to computational difficulties of exact methods in solving our pr...

R. Ramezanian,

In this paper, we consider a flow shop scheduling problem with availability constraints (FSSPAC) for the objective of minimizing the makespan. In such a problem, machines are not continuously available for processing jobs due to preventive maintenance activities. We proposed a mixed-integer linear programming (MILP) model for this problem which can generate non-permutation schedules. Furthermor...

E. Salajegheh, H. Fathnejat, P. Torkzadeh, R. Ghiasi,

Vibration based techniques of structural damage detection using model updating method, are computationally expensive for large-scale structures. In this study, after locating precisely the eventual damage of a structure using modal strain energy based index (MSEBI), To efficiently reduce the computational cost of model updating during the optimization process of damage severity detection, the M...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید