نتایج جستجو برای: excel software version 2010 and spss software version 18 have been used results

تعداد نتایج: 17178034  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

2017
Herta de Oliveira Alexandre Marli Teresinha Gimeniz Galvão Gilmara Holanda da Cunha

Aim: To evaluate the quality of life and the nursing diagnoses of women with AIDS. Methods: Cross-sectional study involving 70 women with AIDS in outpatient follow-up. The sociodemographic and clinical form and the Brazilian version of the World Health Organization Quality of Life HIV instrument were used for data collection. Nursing diagnoses were determined according to NANDA-I Taxonomy II. T...

2012
Indranil Chatterjee Hindol Halder Sayani Bari Suman Kumar Amitabha Roychoudhury

The study was aimed to analyze the changes in acoustic parameters based upon age and gender effects and to obtain normal voice range profile (VRP) of adult male and female of three different age range. Total no. of 90 subjects were grouped into three groups as per their age (20-30, 40-50 and 60-70 years) consisting 15 males and 15 females in each group. All participants were native Bengla speak...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت معلم تهران - دانشکده علوم 1372

in this study reference as one of the five cohesive devices in the achievement of textuality in english and persian narrative/descripitive written texts is focused on and analysed . to do so , the theoretical framework elaborated by halliday and hasan (1976) and its version adapted by the writer to match the sub-types of reference in farsi are applied to the analysis of reference in english and...

Journal: :IEEE Access 2021

Identifying the credibility of executable files is critical for security an operating system. Modern systems rely on code signing, which uses a default-valid trust model, to identify their publishers. A malware could pass software validation and by using counterfeit code-signing certificates. Although certificates can be revoked CAs, previous research showed that revocation delay takes as long ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - پژوهشکده علوم 1388

heteropoly acids (hpa) and their salts have advantages as catalysts which make them both economically and environmentally attractive, strong br?nsted acidity, exhibiting fast reversible multi-electron redox transformations under rather mild conditions, very high solubility in polar solvents, fairly high thermal stability in the solid states, and efficient oxidizing ability, so that they are imp...

پایان نامه :0 1374

the following null hypothesis was proposed: h : there is no significant difference between the use of semantically or communicatively translates scientific texts. to test the null hypothesis, a number of procedures were taken first, two passages were selected form soyrcebooks of food and nutrition industry and gardening deciplines. each, in turn, was following by a number of comprehension quest...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1393

abstract this quasi-experimental study was aimed at examining the impact of storyline complexity on the grammatical accuracy and complexity of advanced and intermediate efl learners. a total of 65 advanced and intermediate efl learners were selected from iran language institute (ili). an intact group including 35 intermediate participants and another intact group with 30 advanced participants ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1389

wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده ریاضی 1390

the main objective in sampling is to select a sample from a population in order to estimate some unknown population parameter, usually a total or a mean of some interesting variable. a simple way to take a sample of size n is to let all the possible samples have the same probability of being selected. this is called simple random sampling and then all units have the same probability of being ch...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید