نتایج جستجو برای: this paper describes field

تعداد نتایج: 6581799  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران 1388

some researches made in the field of agency problem issue, deal with the role of control systems regarding owners and managers. in this research the relationship between the two control mechanisms, namely the voluntary disclosure (external control mechanism) and outside directors (internal control mechanism), which are reductive of agency problems, has been studied. for this reason, a sample ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی و اجتماعی 1392

tourism , today as one of the ways to make money, create jobs , and social and political interactions is considered. this paper aims to examine the strengths and weaknesses of tourism development in mahmoud abad ( mazandaran ). the research method in this study is " descriptive - analytical " and to collection of data used field methods such as questionnaires and documentation - library. the sa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک 1389

this study investigates the relationship between field-related cognitive styles and global reading comprehension of hypertext. technically, field dependency is prevailing dominance of field on perception of parts, while global comprehension is skim-like reading to grasp the general content. in this research project, 60 senior and junior students of arak university majoring in english literature...

2006
OUARDA HACHOUR

This paper describes a method of Automatic Arabic Character Recognition (ACR). This system is articulated around four distinct modules which are the main image processing given by: a module of treatment, a module of segmentation, a module of recognition and a module of detection of symbols of classification. For classification; we have used Fuzzy Logic (FL), Genetic Algorithm (GA), and Expert S...

1997
Laurie Kantner Stephanie Rosenbaum Connie Leas

Current usability practices favor such an approach. Increasingly, companies are conducting usability programs with cross-functional teams including full-time usability specialists, technical writers with some usability responsibilities, and representatives from marketing and product development. In the authors’ consulting firm, Tec-Ed, most of the usability specialists are also veteran technica...

2001
Sidney C. Bailin Walt Truszkowski

This paper describes an approach to ontology negotiation between information agents. Ontologies are declarative (data driven) expressions of an agent’s “world”: the objects, operations, facts, and rules that constitute the logical space within which an agent performs. Ontology negotiation enables agents to cooperate in performing a task, even if they are based on different ontologies. The proce...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد 1376

in this thesis our aim is to construct vector field in r3 for which the corresponding one-dimensional maps have certain discontinuities. two kinds of vector fields are considered, the first the lorenz vector field, and the second originally introced here. the latter have chaotic behavior and motivate a class of one-parameter families of maps which have positive lyapunov exponents for an open in...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده مهندسی 1387

abstract this paper discusses several commonly used models for strategic marketing¹ including market environmental analysis methods (i.e. swot and pest analysis) and strategic marketing tools and techniques (i.e. boston matrix and shell directional policy matrix)and shows how these models may help a firm to achieve its strategic goals. at first, the main reason for doing this research is de...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید