نتایج جستجو برای: we mute all samples above the corresponding hyperbola and below those for the next events and apply the nonstretch nmo the process completed by summing all the eventsthe no stretch nmo technique has been tested on synthetic and real data the synthetic data include cmp gathers of a flat layer

تعداد نتایج: 27706991  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی و مهندسی 1390

sange siyah dam is located two kilometers down the kabod khani village. the environ of ghorrve city in kurdestan province. this is an clay core dam. in this dam instrumentation is performed in three section and consist of electrical piezometers, total pressure cells, settlement cells and so on. the main objective of instrumentation is to control the behavior of dam body and foundation, end else...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1387

boron nitride semiconducting zigzag swcnt, $b_{cb}$$n_{cn}$$c_{1-cb-cn}$, as a potential candidate for making nanoelectronic devices was examined. in contrast to the previous dft calculations, wherein just one boron and nitrogen doping configuration have been considered, here for the average over all possible configurations, density of states (dos) was calculated in terms of boron and nitrogen ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده مدیریت و اقتصاد 1391

abstract nowadays, industries cannot play a crucial role in national and international competitions. the tourism industry is no exception. tourism industry development as the most important economic sector and income generation is one of the key challenges of economic development in the world. therefore, countries were successful that take advantage of the capabilities of tourism sector using ...

پایان نامه :0 1375

the significance of the study of deixis was then mentioned. the purpose of the present study from the outset was to provide a comprehensive overview of all kinds of deixis in persian, describing and defining each in true while considering them structurally and semantically. chapter two consisted of two main parts. a review of the english studies in this respect, besides presenting persian liter...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه دانشهای بنیادی (مرکز تحقیقات فیزیک نظری و 1387

we show that when both sources ( lepton flavor violation sources and cp-violating phases) are present, the electric dipole moment of the electron, $d_e$, receives a contribution from the phase of the trilinear $a$-term of staus, $phi_{a_ au}$. for $phi_{a_ au}=pi/2$, the value of $d_e$, depending on the ratios of the lfv mass elements, can range between zero and three orders of magnitude a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1382

‏‎despite the different criticisms on contrastive analysis it has been proved that the results of it(when processed) can be useful in a tefl environment, specially at the level of phonology.this study is an attempt to compare and contrast the sound systems of kurdish and english for pedagogical aims.the consonants,vowels,stress and intonation of the two languages are described by the same model...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه - دانشکده علوم 1391

nanotechnology is a general term which is related with field of all advanced science term that generally predicates with all modern technologies which consider nanoscales. improvement in the quality of products by adding some nanoparticles and study of their behavior in the presence of these nanoparticles have been obtained in many researches. on the other hand numerous demands for sowing ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید