نتایج جستجو برای: of the proposed scenarios and different math programming models

تعداد نتایج: 25080369  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی 1390

iv abstract this study examined the linguistic behaviors of two iranian efl teachers each of them teaching learners of two similar proficiency levels, a beginner level and an intermediate level, to investigate the relationship between the learners proficiency levels and the amounts and purposes for l1 use by the two teachers. the study was carried out to investigate whether there were differe...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی علوم پایه زنجان - دانشکده فیزیک 1392

in the first part of this thesis we explored wetting and its dynamics for small droplets. first, we showed how a simple feature of water droplets on a surface, i.e. laplace pressure, can be exploited to build a micropump. we investigated capillary pumping in microchannels both experimentally and numerically. putting two droplets of different sizes at the in/outlet of a microchannel, will ge...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1389

rivers and runoff have always been of interest to human beings. in order to make use of the proper water resources, human societies, industrial and agricultural centers, etc. have usually been established near rivers. as the time goes on, these societies developed, and therefore water resources were extracted more and more. consequently, conditions of water quality of the rivers experienced rap...

پایان نامه :0 1374

the following null hypothesis was proposed: h : there is no significant difference between the use of semantically or communicatively translates scientific texts. to test the null hypothesis, a number of procedures were taken first, two passages were selected form soyrcebooks of food and nutrition industry and gardening deciplines. each, in turn, was following by a number of comprehension quest...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده ادبیات و علوم انسانی 1388

abstract: the present thesis includes ; one preface and 11speeches , that each speech considered in different researches . the prefact part , studied grammer back ground , the first speech considered a brief description about grammatical credits . the second speech considered the different typs of sentences , from structure and meaning points of view . the third speech considered the verb es...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده علوم 1392

the history of plant’s used for mankind is as old as the start of humankind. initially, people used plants for their nutritional proposes but after the discovery of medicinal properties, this natural ?ora became a useful source of disease cure and health improvement across various human communities. berberis vulgaris is one of the medicinal plants used in iranian traditional medicine. berberis ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

a one dimensional dynamic model for a riser reactor in a fluidized bed catalytic cracking unit (fccu) for gasoil feed has been developed in two distinct conditions, one for industrial fccu and another for fccu using various frequencies of microwave energy spaced at the height of the riser reactor (fccu-mw). in addition, in order to increase the accuracy of component and bulk diffusion, instanta...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی و مهندسی 1390

magnetic resonance imaging (mri) is a notable medical imaging technique that makes of phenomenon of nuclear magnetic resonance. because of the resolution and the technology being harmless, mri has considered as the most desirable imaging technique in clinical applications. the visual quality of mri plays an important role in accuracy of medical delineations that can be seriously degraded by exi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده کشاورزی و منابع طبیعی 1392

the aim of the present study was to determine the in?uence of presence or absence of corpus luteum (cl) on hormonal and metabolites composition of follicular ?uid (ff) harvested from different sized follicles and its relationship with blood serum concentrations in sanjabi ewes. ovaries and blood samples were collected from 60 clinically healthy adult ewes (sanjabi breed) 1–3 years of age in dio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید