نتایج جستجو برای: مدل breach gui

تعداد نتایج: 129795  

Journal: :مجله مطالعات حقوق تطبیقی 0
محمدتقی رفیعی استادیار دانشکده حقوق پردیس بین¬المللی قم، دانشگاه تهران منصوره حسینی کارشناس ارشد حقوق خصوصی دانشگاه تهران

a non-performance of contract in due date is considered as an actual breach, has sanctions in order to securing interest of the injured party. has foreseeable breach of contract - it is accepted today as an actual breach by different legal systems - the same sanctions of actual breach of contract? in this article suspension of performance of obligations by innocent party and, in some conditions...

Journal: :journal of paramedical sciences 0
daryoush khoramian department of medical physics, faculty of medicine, tarbiat modares university, tehran, iran. soroush sistani department of medical physics, semnan university of medical sciences, semnan, iran.

primary and widely in use computed tomography (ct) dose descriptor is a volumetric ct dose index (ctdiv) that is usually measured by a pencil ionization chamber with active length of 100mm and polymethyl methacrylate (pmma) phantom. ctdiv depends on scan parameters such as mas, kv, collimation, tube rotation time but is independent of patient’s size and shape. for the purpose of a good estimati...

Employees are sensitive to promises offered at the beginning of their employment and if these promises are breached, they react in  different ways. These reactions differ in different cultures. The purpose of this research is to shed some light on the relationship between psychological contract breach and organizational citizenship behavior and turnover intention emphasizing the moderat...

2003
Dinesh P. Mehta Mario A. López Lan Lin

This paper discusses the computation of optimal coverage paths in an ad-hoc network consisting of n sensors. Improved algorithms, with a preprocessing time of O(n log n), to compute a maximum breach/support path P in optimal O(|P |) time or the maximum breach/support value in O(1) time are presented. Algorithms for computing a shortest path that has maximum breach/support are also provided. Exp...

2016
Dalal Hammoud Fadi A. Zaraket Wes Masri

Oracles used for testing graphical user interface (GUI) programs are required to take into consideration complicating factors such as variations in screen resolution or color scheme when comparing observed GUI elements to expected GUI elements. Researchers proposed fuzzy comparison rules and computationally expensive image processing techniques to tame the comparison process since otherwise the...

2017
Ziqian Song Gang Alan Wang Weiguo Fan

Managing information resources including protecting the privacy of customer data plays a critical role in most firms. Data breach incidents may be extremely costly for firms. In the face of a data breach event, some firms are reluctant to disclose information to the public. Firm may be concerned with the potential drop in the market value following the revelation of a data breach. This paper ex...

2016
P. Peeters M. Heredia Gomez M. van Damme P. J. Visser

Within the frame work of the realis large-scale dike breaching experiment following overflow was held at Lillo (Antwerp) in 2012. The outcomes of the breach test serve to unveil the impact of a chosen breach growth model, to set application limits, to come up with guidelines for proper selection and usage of the model to be applied. Breach growth models are used to predict the breach dimensions...

باتوجه به کاربرد گستردة ماهواره­های مخابراتی مدار زمین‌آهنگ و مدت زمان بالایی که صرف طراحی مفهومی این نوع ماهواره­ها می‌شود، در این پژوهش به­منظور کاهش مدت زمان و هزینة فاز طراحی مفهومی، نرم‌افزاری بر پایة ادغام دو روش آماری و پارامتری تدوین شده است. مدل آماری استفاده شده در این نرم‌افزار شامل پایگاه داده متشکل از 147 ماهواره است که بین سال­های 2010 تا 2016 پرتاب شده‌اند. جهت افزایش دقت نرم‌افز...

2004
Ryen W. White

This poster describes a visualisation technique for communicating the effects of implicit feedback decisions using a familiar interface component, the scrollbar. The results of a pilot evaluation show the technique is unobtrusive and encourages focused interaction.

Journal: :Journal of Japan Society of Civil Engineers, Ser. B1 (Hydraulic Engineering) 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید