نتایج جستجو برای: Computational method

تعداد نتایج: 1825810  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه 1377

the methods which are used to analyze microstrip antennas, are divited into three categories: empirical methods, semi-empirical methods and full-wave analysis. empirical and semi-empirical methods are generally based on some fundamental simplifying assumptions about quality of surface current distribution and substrate thickness. thses simplificatioms cause low accuracy in field evaluation. ful...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بوعلی سینا - دانشکده علوم پایه 1391

abstract: in this thesis, we focus to class of convex optimization problem whose objective function is given as a linear function and a convex function of a linear transformation of the decision variables and whose feasible region is a polytope. we show that there exists an optimal solution to this class of problems on a face of the constraint polytope of feasible region. based on this, we dev...

Journal: :international journal of bio-inorganic hybrid nanomaterials 0

in this work, the first in the world of science, the focus was on the best angle of connection between carbon nanotubes and the most widely used group of antibiotics. while having the highest stability, in terms of energy, we have the best angle of to connect to the in vivo delivery of intraoperative antibiotic binding with carbon nanotubes not lost. it will never work in the world of science. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده مهندسی 1389

abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...

Journal: :molecular biology research communications 2016
bahram baghban-kohnehrouz shahnoush nayeri

multiple gene silencing is being required to target and tangle metabolic pathways in eukaryotes and researchers have to develop a subtle method for construction of rna interference (rnai) cassettes. although, several vectors have been developed due to different screening and cloning strategies but still some potential limitations remain to be dissolved. here, we worked out a simple cloning stra...

Journal: :international journal of mathematical modelling and computations 0
pramod pandey university

in this article, we propose and analyze a computational method for numerical solution of general two point boundary value problems. method is tested on problems to ensure the computational eciency. we have compared numerical results with results obtained by other method in literature. we conclude that propose method is computationally ecient and e ective.

Journal: :Geological data processing 1989

Journal: :مهندسی سازه 0
علی کاوه مسعود پوربابا

in this paper by using concepts of graph theory, forces method and substructure ing method for analysis of structures, some methods have been introduced for optimal analysis of structures in a large scale, using substructuring method. planar rigid frames assuming linear behavior and small deformations, have been optimal analyzed, by using forces method. thus, a fortran power station computation...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید