Information Regarding Program Input
ثبت نشده
چکیده
Finite element analyses generally require large amounts of input data. The preparation of this data should be as easy as possible and should leave little room for error. In keeping with these concerns, the input associated with the APES computer program has been designed for ease of use, flexibility, and consistency. Further details regarding the program input are given in the subsequent sections of this part of the documentation.
منابع مشابه
Exploring Learners’ Viewpoint regarding Training Program of Health Care Providers Based on CIPP Model
Background: Aiming to explore learners’ viewpoint regarding training program of health care providers based on CIPP model, this research was conducted on health care providers in the city of Sabzevar in 2017. Methods: This cross-sectional study was carried out on 139 health care providers working in the health centers of ...
متن کاملDesigning the internal evaluation indicators of educational planning in postgraduate program (input, process, outcome domains) in public health faculty. Isfahan
Introduction:This study has tried to design educational program indicators for internal evaluation of graduate courses in health school. Regarding the systemic approach in educational framework, the related indicators have been categorized in three groups as input, process and output. Method: First, indicators of graduate educational programs were defined based on different resources and scho...
متن کاملOSD: A Source Level Bug Localization Technique Incorporating Control Flow and State Information in Object Oriented Program
Bug localization in object oriented program ha s always been an important issue in softeware engineering. In this paper, I propose a source level b u g l o c a l i z a t i o n technique for object oriented embedded programs. My proposed technique, presents the idea of debugging an object oriented program in class level, incorporating the object state information into the Class Dependence Graph ...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملOptimal Estimation of Weibull Distribution Parameters in order to Provide Preventive-Corrective Maintenance Program for Power Transformers
In this paper, a new method for modelling and estimation of reliability parameters of power transformer components in distribution and transmission voltage levels for preventive-corrective maintenance schedule of transformers is proposed. In this method, with optimal estimation of Weibull distribution parameters using least squares method and input data uncertainty reduction, failure rate and p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010