نتایج جستجو برای: denton methods

تعداد نتایج: 1874721  

2010

We develop algorithms for a single machine stochastic appointment sequencing and scheduling problem with waiting time, idle time, and overtime costs. This is a basic stochastic scheduling problem that has been studied in various forms by several previous authors. Applications for this problem cited previously include scheduling of surgeries in an operating room (Denton, 2007, Denton and Gupta,2...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1387

چکیده: بررسی ادبیات مربوطه در کشور در زمینه یادگیری زبان انگلیسی نشان می‎دهد که علی‎رغم اهمیت املا در فرآیند یادگیری به طور عام و یادگیری زبان انگلیسی به طور خاص، این مولفه از جایگاهی متناسب با اهمیت آن برخوردار نیست و عمدتاً نادیده گرفته شده است. تحقیقات گسترده‎ای در خارج از کشور در مورد ماهیت این مولفه صورت گرفته است، در حالی که به جرأت می‎توان گفت در داخل کشور گامی در مورد درک ماهیت آن و فرآی...

1976
C. P. No J. D. Bryce

SUMMARY The Denton two-dimensional and three-dimensional time marching blade-to-blade computer programs have been used at NGTE to analyse the flow past transonic turbine blading. In this work experience has been gained in operating the programs and this paper describes the major findings in respect of how the programs have performed. Solutions for several blade sections, giving Mach number dist...

Journal: :Journal of vector ecology : journal of the Society for Vector Ecology 2005
Bethany G Bolling James H Kennedy Earl G Zimmerman

A population survey was conducted from April through September 2002 on mosquito species occurring on the Ray Roberts Greenbelt, a riparian corridor used for public recreation on the Elm Fork of the Trinity River, in Denton County, TX. Geographic information system software was used to set up a stratified random sampling design based on habitat parameters. Mosquitoes were collected using light t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics 1999
R L Davidchack B B Laird

In order to construct a general density-functional theory for nonuniform fluid mixtures, we propose an extension to multicomponent systems of the weighted-density approximation of Curtin and Ashcroft [Phys. Rev. A 32, 2909 (1985)]. This extension corrects a deficiency in a similar extension proposed earlier by Denton and Ashcroft [Phys. Rev. A 42, 7312 (1990)], in that that functional cannot be...

2013
Eran Hadas Wei Chao Hongxia He Manisha Saini Eleen Daley Mohammed Saifuddin Galina Bentsman Eric Ganz David J. Volsky Mary Jane Potash

1292 INTRODUCTION Since the recognition of acquired immune deficiency syndrome (AIDS), animal models have been developed to study various aspects of human immunodeficiency virus (HIV) infection, pathogenesis and control. The most common route of HIV transmission, sexual transmission (UNAIDS, 2012), has been investigated by simian immunodeficiency virus (SIV) infection of macaques and HIV infect...

Journal: :Ilha do Desterro: A Journal of English Language, Literatures in English and Cultural Studies 2023

The Earlie King & Kid in Yellow (2018), de Danny Denton, narra o mito da destruição Irlanda através do fogo e colapso digital após país enfrentar anos chuvas ininterruptas causadas pela catástrofe ambiental deixada principalmente indústria farmacêutica. O propósito deste artigo é investigar como essa obra coaduna desafia ao mesmo tempo a tradição ecocrítica distópica produzida na língua ing...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید