نتایج جستجو برای: a model is presented to identify information security risks
تعداد نتایج: 16196611 فیلتر نتایج به سال:
reserches show that relationship between human and residential places is based upo both emotional and identity structures. in other words, habitat place is not only the creator of a part of humanistic identity but also form a kind of sentimental and emotional bond that may result in tendency to maintain closeness to a specific place. therefor, formaton of emotional and identity relationship wit...
the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...
abstract: proverbs are of the language materials which of the food of any language depends on the quality and quantity of these same materials. in the present research, the researcher tried to present the ramsarian proverbs according to four variables of color, fruit, plantsand animals that selected from the book of the members of each of these four variables, put them into the spss system fo...
what miller wants is a theatre of heightened consciousness. he speaks of two passions in a man, the passion to "feel" and the passion "know". he belives that we can have more of the latter. he says: drama is akin to the other inventions of man in that it ought to help us know more and not merely to spend our feelings. the writing of the crucible shows us that he is trying to give more heightene...
the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...
chapter one is devotod to collect some notion and background informations, which are needed in the next chapters. it also contains some important statements which will be proved in a more general context later in this thesis. in chapter two, we show that if the marginal factor-group is of order np1...pk,n>1, then we obtain a bound for the order of the verbal subgroup. also a bound for the bear-...
in chapter 1, charactrizations of fragmentability, which are obtained by namioka (37), ribarska (45) and kenderov-moors (32), are given. also the connection between fragmentability and its variants and other topics in banach spaces such as analytic space, the radone-nikodym property, differentiability of convex functions, kadec renorming are discussed. in chapter 2, we use game characterization...
heuristics are often used to provide solutions for flow shop scheduling problems.the performance of a heuristic is usually judged by comparing solutions and run times on test cases.this investigation proposes an analytical alternative ,called asymptotic convergence ,which tests the convergence of the heuristic to a lower bound as problem size grows. the test is a stronger variation of worst cas...
چکیده روش های متعددی برای برآورد رواناب حاصل از بارش در حوضه های آبریز وجود دارد. یکی از این روش ها استفاده از مدل های هیدرولوژیکی است. با استفاده از مدل های هیدرولوژیکی و شبیه سازی فرآیندهای هیدرولوژیکی می توان با صرف کمترین زمان و هزینه، رواناب و مولفه های دیگر چرخ? هیدرولوژیکی را برآورد کرد. از آنجا که در حوضه های آبریز اندازه گیری تمام کمیت های مورد نیاز برای تحلیل رواناب ممکن نیست، انتخاب...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید