نتایج جستجو برای: a factorial test in crd method applied for the statistical analyses in each of these threestrains

تعداد نتایج: 27214223  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1389

this thesis is a study on insurance fraud in iran automobile insurance industry and explores the usage of expert linkage between un-supervised clustering and analytical hierarchy process(ahp), and renders the findings from applying these algorithms for automobile insurance claim fraud detection. the expert linkage determination objective function plan provides us with a way to determine whi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم پایه 1391

bekenstein and hawking by introducing temperature and every black hole has entropy and using the first law of thermodynamic for black holes showed that this entropy changes with the event horizon surface. bekenstein and hawking entropy equation is valid for the black holes obeying einstein general relativity theory. however, from one side einstein relativity in some cases fails to explain expe...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1391

abstract: postmethod is a newly developed pedagogy which as an alternative to method rejects the notion of good or bad methods and the concept of best method that can be generalized and appropriate for all contexts. instead, it treats each context as unique and one of a kind which cant be compared with other cases. this study is a postmethod-oriented one which investigates whether and how far t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده ادبیات و زبانهای خارجی 1391

this study was intended to analyze the listening tapescripts of the elementary and pre-intermediate levels of total english textbooks from the pragmatic dimension of language functions and speech acts in order to see whether the listening tasks are pragmatically informative or not. for this purpose, 8 conversations from the two books were selected randomly, and then, the two pragmatic models of...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده ادبیات، زبانهای خارجی و تاریخ 1389

abstract the main purpose of this study was to investigate whether there was any significant difference between the speaking achievement of learners who were trained by means of consciousness raising of sociolinguistic skills and that of learners who were trained without the above mentioned task. the participants of this study consist of 60 intermediate level students participating languag...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1391

abstract: proverbs are of the language materials which of the food of any language depends on the quality and quantity of these same materials. in the present research, the researcher tried to present the ramsarian proverbs according to four variables of color, fruit, plantsand animals that selected from the book of the members of each of these four variables, put them into the spss system fo...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1390

the present research study attempted to find out the extent to which two pre-task activities of “glossary of unknown vocabulary items” and “content related support” assisted efl language learners with their performance on listening comprehension questions across two different proficiency levels (low and high). data for this study were obtained from a total of 120 language learners, female and m...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

seismic retrofit strategies have been developed in the past few decades following the introduction of new seismic provisions and the availability of advanced materials and methods. it can be observed that new approaches to deal with more lateral forces are more innovative and more energy absorbent. in line with this, there is a growing trend toward the use of steel shear walls as a system with ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید