نتایج جستجو برای: application methods
تعداد نتایج: 2510462 فیلتر نتایج به سال:
The effect of Gibberellic Acid (GA3) and Benzyladenine (BA) on Aloe vera was evaluated at pot cultivation conditions. This study was performed in two factorial test based on complete random plan and 4 repeats with 12 treatments. The main factor was included spraying, drip and spraying + drip. Secondary factor was included concentrations of GA3 and BA at 0, 100...
abstract in order to evaluate the effect of different nitrogen application methods on yield and yield components of winter wheat, a field experiment with split plot arrangement in completely randomized blocks design with four replicates was conducted in 2006. basal dressing in three levels (1- with no basal dressing, 2- strip and 3- distributing nitrogen fertilizer) as main plot and top dressin...
Formal methods are mathematically-based techniques, often supported by reasoning tools, that can offer a rigorous and effective way to model, design and analyze computer systems. The purpose of this study is to evaluate international industrial experience in using formal methods. The cases selected are, we believe, representative of industrial-grade projects and span a variety of application do...
The software application domain of customer-oriented telephony is worth the attention of specialists in formal methods. Primarily this paper is a tutorial about customer-oriented telephony. It also includes observations about how this domain should be formalized, including critiques of some popular
This paper reports the story of the introduction of formal methods in the development process of a railway signaling manufacturer. The first difficulty for a company is due to the many different formal methods proposals around; we show how this difficulty has been addressed and how the choice of a reference formal specification notation and of the related tools has been driven by many external ...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
the space now known as complete erdos space ec was introduced by paul erdos in 1940 as the closed subspace of the hilbert space ?2 consisting of all vectors such that every coordinate is in the convergent sequence {0} ? { 1 n : n ? n}. in a solution to a problem posed by lex g. oversteegen we present simple and useful topological characterizations of ec. as an application we determine the ...
The following article briefly summarizes the design aids currently in use, such as topology optimization and generative design, which are common integrated CAD systems. results provided by these methods presented compared based on a case study.
This study investigates two design factors of store atmosphere in relation to store image and consumers’ expectations of merchandise quality for web-based stores. We address this purpose through the use of the Stimulus–Organism–Response (S–O–R) model on which five hypotheses were drawn based on research conducted with brick-and-mortar and web-based stores. In order to test the hypotheses, four ...
I generation (ideation) is critical to the design and marketing of new products, to marketing strategy, and to the creation of effective advertising copy. However, there has been relatively little formal research on the underlying incentives with which to encourage participants to focus their energies on relevant and novel ideas. Several problems have been identified with traditional ideation m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید