نتایج جستجو برای: by using geographic âinformation system

تعداد نتایج: 9399471  

of this Research is the study and evaluation of the relationship between vegetation area and water area with the number of birds in Band-e-Alikhan wetland between 2011 and 2015. Due to the importance of Band-e-Alikhan wetland as a seasonal wetland with fresh water, which is located 35 km south of Varamin city, it has been used as a study area. In the present study, first, the necessary pre-proc...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم پایه دامغان 1389

in this thesis, ‎‎using‎‎ ‎concept‎s‎ ‎of‎ ‎wavelet‎s‎ ‎theory ‎‎‎som‎e‎ ‎methods‎‎ ‎of‎ ‎th‎e ‎solving‎‎ ‎optimal‎‎ ‎‎con‎tr‎ol‎ problems ‎(ocps)‎‎. ‎g‎overned by time-delay systems is investigated. ‎th‎is‎ thesis contains ‎tw‎o parts. ‎‎first, the method of obtaining ‎o‎f ‎the‎ ‎‎ocps‎ in time delay systems by linear legendre multiwavelets is ‎ ‎presented‎.‎‎‎‎ the main advantage of the meth...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1390

in the new age, in regard to human success in education in the globalizing world, one can consider english proficiency and individual differences as two important issues. in efl settings, reading skill plays an important role in education. it seems that using multiple intelligences theory in efl classes which values individual differences by tapping different intelligences, can be rewarding. as...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان همدان - دانشکده ادبیات و علوم انسانی 1390

abstract this study is an attempt to determine the effect of nano- technology education on science lesson for fifth grade in primary school in the city of kermanshah. this research is experimental and is conducted in the from of pre-test and post- test for the control group. an achievement test was administered to determine the rate of learning in the students. the research is an applied one. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1392

abstract although music possesses some kind of power and using it has been welcome by many students in language classrooms, it seems that they take a non-serious image of the lesson while listening to songs and they may think that it is a matter of fun. the main objective of the present study was to investigate whether learning a foreign language through musical texts (songs) can have an impac...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

2000
Carol Traynor Marian G. Williams

This chapter presents a programming-by-demonstration (PBD) approach to Geographical Information Systems (GIS). The aim of our approach is to enable non-specialist users to avail themselves of the software without having to resort to the help of expert users. We begin with a story of one group of non-specialist users who encountered difficulty with GIS software. Next we summarize findings of a s...

Journal: :iranian journal of public health 0
reza beiranvand asrin karimi ali delpisheh kourosh sayehmiri samira soleimani shahnaz ghalavandi

background: tuberculosis (tb) spread pattern is influenced by geographic and social factors. nowadays geographic information system (gis) is one of the most important epidemiological instrumentation identifying high-risk population groups and geographic areas of tb. the aim of this study was to determine the correlation between climate and geographic distribution of tb in khuzestan province usi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید