نتایج جستجو برای: discreet choice experiment
تعداد نتایج: 631273 فیلتر نتایج به سال:
repeatability, (the consistency with which a given trait is expressed) of aggressiveness against prey (attack latency) in gravid females of the predatory mite neoseiulus californicus (mcgregor) was examined. in two experiments, prey - conspecific individuals, the onion thrips thrips tabaci (lindeman), and the two-spotted spider mite tetranychus urticae koch- were repeatedly offered in various n...
This paper presents the novel approach in protection and detection techniques of Alternator stator winding from the earth faults which are simulated between 2% to 10% distance point from the alternator neutral, since the impedence at that distance is very high we can not detect or protect by normal methods. The transient produced is analyzed in discreet Wavelet transforms. The potential of usin...
The purpose of the research is to propose a method acoustic concert halls improve classical music sound conditions with help innovative computer technologies. methodology as follows: music, simulation proposed, which involves use specialized software. subjective evaluation through criteria established sample used systematize results study. comparative was analyze audio materials created spatial...
using a choice experiment survey, the marginal willingness to pay (wtp) among iranian households to avoid power outages is estimated. the results indicate that households prefer lower price of alternatives and the low duration and frequency of outages, and the factors of outage day, outage time and warning in advance of outage are important to households' preferences. moreover, the conditi...
Our goal was to realize a truly hybrid simulation system, which allows the simultaneous use of discreet event simulation and continuous 3D-simulation on a unified database. The key component is an active real-time simulation database, which is an object-oriented, self-reflecting graph database, with a powerful metainformation system. We achieve this by using State Oriented Modeling, which combi...
Abstract: This paper constructs a new group blind signature scheme on the basis of CZK group signature scheme. The security of the new scheme is under the computational Diffie-Hellman problem in the random oracle model. In our scheme, to blind the group signature of CZK only adds the computation of modular addition; while the scheme in LR98 adds the computation of double discreet logarithm, roo...
Recent advances in mobile communications, location/sensing technologies and data processing are boosting the deployment of context-aware services and smart spaces creation. This is reflected in urban environments by the smart-city vision, a city with advanced ICT and surveillance infrastructures offering to citizens a diversity of services. Nevertheless, privacy risks and threats ambush, since ...
PT. XYZ Discreet is a subsidiary of State-Owned Enterprise (BUMN) in the manufacturing sector which was founded 1983. contributes to defense & security needs and various industrial products that help other fields such as transportation commercial explosives. Organizational culture essential determining success achieving company goals. Therefore, every must know what type they are running ki...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید