نتایج جستجو برای: in each offset section

تعداد نتایج: 17029097  

Journal: :EURASIP J. Wireless Comm. and Networking 2007
Manav R. Bhatnagar R. Vishwanath Vaibhav Bhatnagar

Use of space-time codes with multiple transmit antennas has generated a lot of interest for increasing spectral efficiency as well as improved performance in wireless communications. Although, the literature on space-time coding is quite rich now, the orthogonal designs of Alamouti [1], Tarokh et al. [2, 3], Naguib and Seshádri [4] remain popular. The strength of orthogonal designs is that thes...

Journal: :Science 2010
Lisa Grant Ludwig Sinan O Akçiz Gabriela R Noriega Olaf Zielke J Ramón Arrowsmith

The spatial and temporal distribution of fault slip is a critical parameter in earthquake source models. Previous geomorphic and geologic studies of channel offset along the Carrizo section of the south central San Andreas Fault assumed that channels form more frequently than earthquakes occur and suggested that repeated large-slip earthquakes similar to the 1857 Fort Tejon earthquake illustrat...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید مدنی آذربایجان - دانشکده ادبیات و زبانهای خارجی 1389

according to coates’s (2004, as cited in zhang, 2010) definition of "conversational dominance" (p.111), it refers to the phenomenon of a speaker dominating others in interaction. specifically, it means how a speaker makes use of certain strategies to get the floor and maintain the floor. thus, the amount of talk is the main measurement for the dominance of the conversation. whether a speaker do...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1391

phatic communion is a cultural concept which differs across cultures. according to hofstede (2001), the u.s. tends to have individualistic culture; however, asian countries tend to have collectivistic cultures. these cultures view phatic communion differently. in individualistic cultures like u.s., phatic communion reflects speakers’ socio-cultural relationships in conversations. to see whether...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده ادبیات و علوم انسانی 1393

this study investigates the effect of teacher’s repetition as an input enhancement technique in explicit teaching of vocabulary items on efl learners’ later retrieval. to this end, 66 persian speaking english learners, aged 18 - 29, homogenized through a standard proficiency test (opt), were chosen and put into two experimental and control groups, each 33 learners. general service list (gsl), a...

پایان نامه :دانشگاه تربیت معلم - سبزوار - دانشکده ادبیات و زبانهای خارجی 1390

this study investigated the effects of planning on second-language written production with regard to task type. the participants were 75 iranian learners of english as a foreign language attending a private foreign language institution. they were asked to complete two different types of writing tasks (expository writing task and argumentative writing task) in different planned conditions (indiv...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده مهندسی 1389

abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید