نتایج جستجو برای: situations

تعداد نتایج: 99700  

Journal: :Hunter Gatherer Research 2016

Journal: : 2023

On the basis of previous theoretical and practical research conducted by author, in this paper concept pedagogical situation is studied. The suggested classification situations based on ability a to solve tasks, reach problems, achieve effect thus become event. these as well logic practice teacher's everyday work, three types were previously identified. One type described paper. goal such unach...

Journal: :SSRN Electronic Journal 2012

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده علوم 1391

in this thesis, we consider a mathematical model of cancer with completely unknown parameters. we study the stability of critical points which are biologically admissible. then we consider a control on the system and introduce situations at which solutions are attracted to critical points and so the cancer disease has auto healing. the lyapunov stability method is used for estimating the un...

Journal: :Conjunctions 2016

Journal: :Journal of Digital Social Research 2020

2015
David G. Serfass Ryne A. Sherman Wen-Bo Du

Over 20 million Tweets were used to study the psychological characteristics of real-world situations over the course of two weeks. Models for automatically and accurately scoring individual Tweets on the DIAMONDS dimensions of situations were developed. Stable daily and weekly fluctuations in the situations that people experience were identified. Predicted temporal trends were found, providing ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم بهزیستی و توانبخشی - دانشکده توانبخشی 1393

abstract objectives gradual increase length and complexity of utterance (gilcu) therapy method is a form of operant conditioning. this type of treatment is very precise and controlled that is done in 54 steps in 3 speech situations consisted of monologue, reading and conversation. this study aimed to examine the effects of gilcu treatment method on reduction of speech dysfluency of school-age...

2014
Attacks L. Devi V. Santhiya

There are chances like a data distributor had given his sensitive data to a set of trusted agents. These agents can be called as third parties. There are chances that some of the data is leaked and found in an unauthorized place. This situation is called IDS. In existing case, the method called watermarking is using to identify the leakage. Or also uses the technique like injecting fake data th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید