نتایج جستجو برای: thus we focused on development of rapid methods such as prediction based on sequence and structure of protein. methods: a wide array of immunoinformatics softwares and tools were used for the analysis of antigenicity
تعداد نتایج: 27440243 فیلتر نتایج به سال:
the methods which are used to analyze microstrip antennas, are divited into three categories: empirical methods, semi-empirical methods and full-wave analysis. empirical and semi-empirical methods are generally based on some fundamental simplifying assumptions about quality of surface current distribution and substrate thickness. thses simplificatioms cause low accuracy in field evaluation. ful...
among the low–dimensional allotropes of carbon, nanotubes and graphene have attracted very much attention from nano–science and nanotechnology specialists. they have been proposed as building blocks in nanometer device engineering. however, these structures are not defect–free. in this thesis, we focused on defective carbon nanotubes and graphene, and studied the effect of couple of very common...
abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...
data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...
all analytical methods are generally based on the measurement of a parameter or parameters which are somehow related to the concentration of the species.an ideal analytical method is one in which the concentration of a species can be measured to a high degree precision and accuracy and with a high sensitivity. unfortunately finding such a method is very difficult or sometimes even impossible.in...
power transformers are important equipments in power systems. thus there is a large number of researches devoted of power transformers. however, there is still a demand for future investigations, especially in the field of diagnosis of transformer failures. in order to fulfill the demand, the first part reports a study case in which four main types of failures on the active part are investigate...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
in this investigation the effect of external field on the electron density of nanostructures of cds, cdse, cdte, gaas and polymeric structure of three, four, five and six units of cds as a kind of nanosolar cells has been studied theoretically. as modeling this system in nanodimension, molecular structures has used. specific properties of molecular structures permit us to consider different sym...
abstract ion selective electrodes (ises) are electrochemical sensors that respond selectivity to the activity of ionic species. an ion-selective electrode is an electrochemical device that uses a thin selective membrane or film as the recognition element, and is an electrochemical half-cell equivalent to other half-cells of the zeroth (inert metal in a redox electrolyte). in common methods o...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید