نتایج جستجو برای: interface methods

تعداد نتایج: 2051445  

Journal: :computational methods for differential equations 0
javad farzi sahand university of technology

this paper concerns with the modeling and construction of a fifth order method for two dimensional acoustic wave equation in heterogenous media. the method is based on a standard discretization of the problem on smooth regions and a nonstandard method for nonsmooth regions.the construction of the nonstandard method is based on the special treatment of the interface using suitable jump condition...

1993
Maria Brielmann Bernd Kleinjohann

One of the main challenges of information technology is the development of heterogeneous systems consisting of digital and analogue parts. In this paper a technique for the common modelling of the diierent system parts and their interfaces is shown that allows to develop all parts of the system in a consistent manner. This technique is based on extensions of predi-cate/transition nets. Based on...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1387

چکیده: بررسی ادبیات مربوطه در کشور در زمینه یادگیری زبان انگلیسی نشان می‎دهد که علی‎رغم اهمیت املا در فرآیند یادگیری به طور عام و یادگیری زبان انگلیسی به طور خاص، این مولفه از جایگاهی متناسب با اهمیت آن برخوردار نیست و عمدتاً نادیده گرفته شده است. تحقیقات گسترده‎ای در خارج از کشور در مورد ماهیت این مولفه صورت گرفته است، در حالی که به جرأت می‎توان گفت در داخل کشور گامی در مورد درک ماهیت آن و فرآی...

ژورنال: سلامت کار ایران 2008
ارقامی, شیرازه , تقدیسی, محمدحسین, حسن زاده رنگی, نرمین, خسروی, یحیی, فرشاد, علی اصغر, گوهری, محمودرضا,

  Background and aims   The HCS standard includes listing of chemicals, labeling of chemical  containers, preparation of material safety data sheets, writing plan and employee training  programs. The aim of this study was to determine the influence of implemented program to enhance the knowledge and safety performance level of employees.   Methods   The knowledge level and unsafe act ratio were...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :Electr. Notes Theor. Comput. Sci. 2008
Li Su Howard Bowman Philip J. Barnard

Previous research has developed a formal methods-based (cognitive-level) model of the Interacting Cognitive Subsystems central engine, with which we have simulated attentional capture in the context of Barnard’s key-distractor Attentional Blink task. This model captures core aspects of the allocation of human attention over time and as such should be applicable across a range of practical setti...

2014
Michael D. Harrison Paolo Masci José Creissac Campos Paul Curzon

One way of contributing to a demonstration that a medical device is acceptably safe is to show that the device satisfies a set of requirements known to mitigate hazards. This paper describes experience using formal techniques to model an IV infusion device and to prove that the modelled device captures a set of requirements. The requirements chosen for the study are based on a draft proposal de...

Journal: :International Journal for Numerical Methods in Biomedical Engineering 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید