نتایج جستجو برای: computer and information technology
تعداد نتایج: 16983313 فیلتر نتایج به سال:
today, teaching language through the use of technology has become considerably widespread in many countries. the present research aims to investigate the extent to which computer software and new technologies are employed in teaching persian language. in addition, it studies the reasons for success or failure of these tools. the study, which was conducted in a comparative framework, used a rese...
More than 15 years have passed since the word "virtual reality" became popular in our society. Now VR technology is at the stage where realistic application should be discussed. For example, it is said that museums are now a good application field of VR technology. In this paper, recent VR technologies which can be utilized for museum exhibits are introduced. The topics include sophisticated im...
0
one of the most important goals for increasing recognition and treatment revenue is transmitting vital data to medical care team, more quickly. nowadays, use of new technologies for transmitting data will deploy more and more daily. in this article, for transmitting electrocardiogram, first we code the signal into a suite of codes, then we will use bluetooth technology to transmit data from off...
the present research was conducted to build a conceptual model of internal effective factors of small and medium enterprises in mazandaran province. to accomplish the goal of the research first, a complete review of the related literature was conducted. second, questionnaires were given to the corresponding population. finally, the gathered data were calculated and analyzed using spss, excel an...
In this paper, we try to explain the legal area of two Acts on one topic. The first act, entitled “Act for punishment of persons who illegally intervene in audio and visual actions”, is on criminal conducts which their main issue of actual element is audio and visual products. In contrast, the second Act entitled “cyber-crimes Act” includes doing of crime by using of information technology like...
this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید