نتایج جستجو برای: Phase field method

تعداد نتایج: 2762607  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند 1388

a significant problem in multicarrier communication systems is the necessity to reduce the value of papr (peak-to-average power ratio) of transmitting signal. in this thesis we study the effect of the system parameters such as coding and modulation types on papr and ultimate ber in a mc-cdma system. in this study we consider fading channel as well as the nonlinearity of transmitter’s amplifier ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده فیزیک 1390

in this thesis, barium ferrite nano particles were prepared by sol-gel method. their structural and magnetic properties of samples have been investigated using thermo gravimetric analysis (tg-dta), x-ray powder diffractometer (xrd), fourier transform infrared (ftir), scanning electron microscopy (sem), field emission scanning electron microscopy (fesem), ac susceptometer, vibrating sample magne...

پایان نامه :0 1370

all analytical methods are generally based on the measurement of a parameter or parameters which are somehow related to the concentration of the species.an ideal analytical method is one in which the concentration of a species can be measured to a high degree precision and accuracy and with a high sensitivity. unfortunately finding such a method is very difficult or sometimes even impossible.in...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان - دانشکده علوم پایه 1389

abstract part one: the electrode oxidation potentials of a series of eighteen n-hydroxy compounds in aqueous solution were calculated based on a proper thermodynamic cycle. the dft method at the level of b3lyp-6-31g(d,p) was used to calculate the gas-phase free energy differences ,and the polarizable continuum model (pcm) was applied to describe the solvent and its interaction with n-hydroxy ...

Journal: :Physical Review Letters 2018

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - پژوهشکده فنی و مهندسی 1388

asymmetric polyethersulfone (pes) microfiltration flat sheet membranes were composed by the phase inversion method (pim) and were used as supports. composite membranes were fabricated by coating silicone rubber as selective layer. effect of different concentrations of pes and pdms and different solvent such as nmp, dmf and dms effects as pes solvents and support thickness and different coagulat...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان 1390

in iran we already use laminate tubes only in cosmetics industry. laminate tube manufacturers via using the most modern technology of the world, faced with the laminate tube market being saturated in cosmetics industry for packaging the cosmetic creams and toothpaste. but considering the great food market and therefore laminate tube features such as beautiful packaging, ease of use for the fina...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی صنعتی کرمان - پژوهشکده برق و کامپیوتر 1390

a phase-locked loop (pll) based frequency synthesizer is an important circuit that is used in many applications, especially in communication systems such as ethernet receivers, disk drive read/write channels, digital mobile receivers, high-speed memory interfaces, system clock recovery and wireless communication system. other than requiring good signal purity such as low phase noise and low spu...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده علوم انسانی 1390

in solvo-hydrothermal method, xrd pattern was indicated presence of intermediate of ammonium octatmolybdate and ammonium tetramolybdate, which were changed to stble phase of ?-moo3 annealing. sem images were indicated nanoparticle with semispheical morphology and tem image was demonstrated nanoparticles with a diameter size of 25nm. also in impregnate method. the xrd pattern was shown high crys...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید