نتایج جستجو برای: has improved from 041 in the model of neural network to 091 in the model of wavelet

تعداد نتایج: 26063616  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1393

abstract foreign and iranian cultures are far distinct in the constraints imposed on writing and translating for children, since the iranian literary system is mainly concerned with cultural and religious instructions which lead to manipulation of translated texts. this study sought to identify the cultural and social constraints and norms which determined the strategies applied in the transl...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1392

like any other learning activity, translation is a problem solving activity which involves executing parallel cognitive processes. the ability to think about these higher processes, plan, organize, monitor and evaluate the most influential executive cognitive processes is what flavell (1975) called “metacognition” which encompasses raising awareness of mental processes as well as using effectiv...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید مدنی آذربایجان - دانشکده ادبیات و زبانهای خارجی 1389

according to coates’s (2004, as cited in zhang, 2010) definition of "conversational dominance" (p.111), it refers to the phenomenon of a speaker dominating others in interaction. specifically, it means how a speaker makes use of certain strategies to get the floor and maintain the floor. thus, the amount of talk is the main measurement for the dominance of the conversation. whether a speaker do...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تهران 1376

‏‎‏‎utopia has, for four centuries, accompanied that hope of progress and that striving for betterment. it now straggles against a widespread sense that this has been an illusion, or an impossible dream. the utopian idea can never entirely disappear, but utopia as a form of the social imagination has clearly weakened. if it cannot instill its vision in the public consciousness, the consequences...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

assigning premium to the insurance contract in iran mostly has based on some old rules have been authorized by government, in such a situation predicting premium by analyzing database and it’s characteristics will be definitely such a big mistake. therefore the most beneficial information one can gathered from these data is the amount of loss happens during one contract to predicting insurance ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت معلم تهران - دانشکده علوم 1372

in this study reference as one of the five cohesive devices in the achievement of textuality in english and persian narrative/descripitive written texts is focused on and analysed . to do so , the theoretical framework elaborated by halliday and hasan (1976) and its version adapted by the writer to match the sub-types of reference in farsi are applied to the analysis of reference in english and...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده برق و الکترونیک 1390

there are many approaches for solving variety combinatorial optimization problems (np-compelete) that devided to exact solutions and approximate solutions. exact methods can only be used for very small size instances due to their expontional search space. for real-world problems, we have to employ approximate methods such as evolutionary algorithms (eas) that find a near-optimal solution in a r...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

seismic retrofit strategies have been developed in the past few decades following the introduction of new seismic provisions and the availability of advanced materials and methods. it can be observed that new approaches to deal with more lateral forces are more innovative and more energy absorbent. in line with this, there is a growing trend toward the use of steel shear walls as a system with ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید