نتایج جستجو برای: based simulation can be an alternative method which creates virtual environment that has specifics of chosen climate in this way all necessary results can be obtained simulation software has no limitation of place or time for cities that are not considered in software
تعداد نتایج: 26570787 فیلتر نتایج به سال:
nowadays,tourism industry considered as one of the main sources of income of a country.unfortunately and despite of owning plenty of cultural historical and natural attractions, iran has not reached to a proper position in this field. besides, the historical cities of a country are considered as the income resource and national wealth of it. qazvin with a rich cultural precedent, have suitable ...
worship is submission and humitility with believe to divinity in fornt of god. in jewish religion ,worship is submission of the god inall the ordes and devosion tohim .worshio is not only so widely in islam and jew and does not include pray and fast and etc but also is every action that human does with divine intention and to content him. worship has huge and excellent rank in qoran and old te...
in reality, most structures involved in geotechnical engineering are three dimensional in nature, and although in many, plane strain or axisymmetric approximations are reasonable, there are some, for which 3-d treatment is required. the quantity of data, and the size of the various vectors and matrices involved in such analysis, increase dramatically. this has sever implications for computer r...
in this thesis a calibration transfer method is used to achieve bilinearity for augmented first order kinetic data. first, the proposed method is investigated using simulated data and next the concept is applied to experimental data. the experimental data consists of spectroscopic monitoring of the first order degradation reaction of carbaryl. this component is used for control of pests in frui...
abstract: postmethod is a newly developed pedagogy which as an alternative to method rejects the notion of good or bad methods and the concept of best method that can be generalized and appropriate for all contexts. instead, it treats each context as unique and one of a kind which cant be compared with other cases. this study is a postmethod-oriented one which investigates whether and how far t...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
learning a second or foreign language requires the manipulation of four main skills, namely, listening, reading, speaking, and writing which lead to effective communication. it is obvious that vocabulary is an indispensible part of any communication, so without a vocabulary, no meaningful communication can take place and meaningful communication relies heavily on vocabulary. one fundamental fac...
this study attempts to investigate the effect of peers’ revision in comparison to that of the teacher, and whether peers’ comments and teachers’ comments facilitate students’ revision? if yes, which one is more effective? also attempts have been made to see which aspects of language are more highlighted by peers versus teachers when commenting. besides, it is investigating the student’s attitud...
what has been discussed here has been a study of international immigration law. this branch of law has not been a major player in the field of international law. no collective law exists, and no codification has been carried out as yet. however, the need for such a set of laws has forced the international community to pay more attention to this issue. the need for a better life in the so-call...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید