نتایج جستجو برای: technological trading methods the ratio of the cost of the technological to the non

تعداد نتایج: 23639836  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

insurers have in the past few decades faced longevity risks - the risk that annuitants survive more than expected - and therefore need a new approach to manage this new risk. in this dissertation we survey methods that hedge longevity risks. these methods use securitization to manage risk, so using modern financial and insurance pricing models, especially wang transform and actuarial concepts, ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه پلیمر و پتروشیمی ایران - پژوهشکده پتروشیمی 1389

this is an original study on the effect of a polyisobutylene – polydimethylsiloxane (pibpdms) block copolymer modifier used as an interfacial active agent on the dynamics behaviour of single newtonian drops suspended in a polyisobutylene (pib) newtonian matrix. the results were divided in two sections. the first part included the experiments carried out on the non-modified and 2% block cop...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده علوم اجتماعی و اقتصادی 1390

بررسی تطبیقی بازده حاصل از کاربرد تحلیل های تکنیکال و روش خرید و نگهداری در بورس اوراق بهادار تهران چکیده در این پژوهش بازدهی حاصل از روش های تجزیه و تحلیل تکنیکی و روش خرید و نگهداری در فرض قابل پیش بینی بودن قیمت ها و عدم وجود شکل ضعیف فرضیه بازار کارا که توسط فاما در سال 791 مطرح گردیده است ، فعالیت میکند . در این مطالعه چهار روش از پر کاربردترین و معتبر ترین روش های تحلیل تکنیکی مورد بر...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده تربیت بدنی علوم ورزشی 1390

this research was conducted to examine the effect of a concurrent training on rest level of leptin of plasma and some hormonal factors in non-athlete subjects. the research population included non-athlete men who didn’t participate in any organized sport activities. 30 men were chosen voluntarily among the above-mentioned population and were divided into 2 groups: experimental (15 subjects) an...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :0 1370

all analytical methods are generally based on the measurement of a parameter or parameters which are somehow related to the concentration of the species.an ideal analytical method is one in which the concentration of a species can be measured to a high degree precision and accuracy and with a high sensitivity. unfortunately finding such a method is very difficult or sometimes even impossible.in...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1392

like any other learning activity, translation is a problem solving activity which involves executing parallel cognitive processes. the ability to think about these higher processes, plan, organize, monitor and evaluate the most influential executive cognitive processes is what flavell (1975) called “metacognition” which encompasses raising awareness of mental processes as well as using effectiv...

پایان نامه :0 1374

the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1389

in reality, most structures involved in geotechnical engineering are three dimensional in nature, and although in many, plane strain or axisymmetric approximations are reasonable, there are some, for which 3-d treatment is required. the quantity of data, and the size of the various vectors and matrices involved in such analysis, increase dramatically. this has sever implications for computer r...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید