نتایج جستجو برای: specific methods

تعداد نتایج: 2722470  

Journal: :Bulletin of the Transilvania University of Brasov. Series V : Economic Sciences 2022

Knowledge management (KM) is unquestionably one of the most promoted branches scientific management. As term itself suggests, this particular administrative model directs attention toward knowledge, understood as important resources within an organization. The main objectives current article are to discuss and analyze some frequently proposed managerial means methods surpassing certain difficul...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده حقوق 1392

abstract the problems caused by the traditional system of criminal justice (which are based on remuneration and rehabilitation) such as, lack of attention to victim’s rights and position and society, underlie the emergence of restorative justice which had the victim-centered perspective, with respect to the role of the offender and participation of civil society. meanwhile, criminal mediation ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1372

most of the verbal constructions of harzani dialect have got inflectional affixes. the majority of the constructions are made up vy adding a specific verbal affix to the verbal stem (infinitive without infinitive marker). only a few number of them is formed by adding a verbal affix to the past participle of the verb. there are specific rules for the formation of different verbal types. there is...

2016
Daya Gupta Rinky Dwivedi

The research focuses on Agile Method configuration process that supports an Essentiality attribute for the agile methods. Since, these methods adhere to a set of practices it's hard to produce a generic model for the purpose. It was noted, that software development community has adopted method configuration to form project-specific method for agile methodology but have not treated the ‘notion o...

2007
Hyun-Ho Kang Brian M. Kurkoski Kazuhiko Yamaguchi Kingo Kobayashi

In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper we generalize our previous work, further the collusion robustness is supplemented by additional security and practical experiment. This includes a more efficient tree decision method, generalization of the fingerprin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید