نتایج جستجو برای: روش ten
تعداد نتایج: 479798 فیلتر نتایج به سال:
در صنعت پالایشگاه و پتروشیمیها به دلیل وجود تجهیزات تمام فلزی محیط اسیدی خوردگیتنشی زیاد است با توجه افزایش کاربرد فولادهای زنگ نزن این صنایع پژوهش بررسی اثر ضربات امواج اولتراسونیک بر رفتار خوردگی فولاد 316 (S.S 316) میپردازیم. هدف از تأثیر روش تنشزدایی برافزایش مقاومت قطعات محیطهای خورنده است. لازم ذکر که، تنش پسمان نمونهها جوشکاری ایجادشده ابتدا نمونه مدنظر استفاده ارتعاش تحت فرکانس 20...
This paper seeks to review a selection of ten salient critical claims about Economic and Monetary Union (EMU) that were heard in the 1990s in either the Political Science literature or the Economics literature or both. In this paper, the author focuses on five salient Political Science claims and five Economics claims prominent at the time that pointed to problems with EMU that could undermine ...
This paper reports data for a series of two-person games that are played only once. These games span the standard categories: static and dynamic games with complete and incomplete information. For each game, the treasure is a treatment for which behavior conforms quite nicely to the predictions of the Nash equilibrium or relevant refinement. In each case we change a key payoff parameter in a ma...
The User Requirements Notation (URN), standardized by the International Telecommunication Union in 2008, is used to model and analyze requirements with goals and scenarios. This paper describes the first ten years of development of URN, and discusses ongoing efforts targeting the next ten years. We did a study inspired by the systematic literature review approach, querying five major search eng...
Submachine code genetic programming and multiple classification GP runs are used to winow the predictive inputs and then evolve an entry to the WCCI-2007 binary time series prediction task held at the Congress on Evolutionary Computation (CEC-2006) held in Vancouver.
Ten years ago, computer security was an arcane discipline that many academics did not see as an interesting or deep research area. Today, that perception has changed. Information assurance and computer security touch every aspect of our lives, and the interconnections with more traditional academic disciplines such as analysis of algorithms, operating systems, and network protocols have convinc...
Karbalaei Khiavi H, Pirayesh A, Seyed Masoumi SY, Khabbaz Jolfaei H (2021). Reaction of ten peach and ten nectarine cultivars to powdery mildew. Plant Pathology Science 10(1):1-13. Doi: 10.2982/PPS.10.1.1. Introduction: Powdery mildew caused by Podosphaera pannosa is one of the most important diseases of peaches and nectarines worldwide, including Iran. The aim of this research was to ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید