نتایج جستجو برای: cost of exploitation
تعداد نتایج: 21186035 فیلتر نتایج به سال:
the mines are an important section of national heritage and public domain. in legal aspect there are several theories about the mines such as; ownership; public domain and non-proper tier things. some of the islamic jurists believe mines are anfal and others say they are non-proper tier things. although the prohibition or restriction in exploitation of mine is useful because of fairly distribut...
Background and objectives: Rangelands, in addition to their very important role in the sustainability of natural ecosystems, due to having a variety of medicinal-industrial plants, play an important role in meeting the medicinal and economic needs of the country. Creating suitable investment opportunities for more production of these plants is important and it is necessary to conduct extensive ...
چکیده: در این تحقیق تأثیر ملاس که یکی از محصولات جانبی صنایع قند می باشد به عنوان یک افزودنی مقاومت خشک جدید در بهبود پالایش پذیری و ویژگی های فیزیکی و مکانیکی مقوای کنگره ای کهنه (occ) مورد بررسی قرار گرفته شد. بدین منظور پنج سطح ملاس( 0،5، 10، 15 و 18%) و سه سطح درجه روانی(420،400و320 میلی لیتر)به عنوان فاکتورهای متغیر در نظر گرفته شد و برای هر تیمار کاغذهای دست ساز با مساحت 2cm200 و وزن پای...
Optimal foraging theory has been criticized for underestimating patch exploitation time. However, proper modeling of costs not only answers these criticisms, but it also explains apparently irrational behaviors like the sunk-cost effect. When a forager is sure to experience high initial costs repeatedly, the forager should devote more time to exploitation than searching in order to minimize the...
The hypothesis selection problem (or the k-armed bandit problem) is central to the realization of many learning systems. This paper studies the minimization of sampling cost in hypothesis selection under a probably approximately optimal (PAO) learning framework. Hypothesis selection algorithms could be exploration-oriented or exploitation-oriented. Exploration-oriented algorithms tend to explor...
Since real data is time-consuming and expensive to collect, label, and use, researchers have proposed approaches using synthetic variations for the tasks of signature verification, speaker authentication, handwriting recognition, keyword spotting, etc. However, the limitation of real data is particularly critical in the field of writer identification in that in forensics, enemies or criminals u...
چکیده ندارد.
While the exploitation of aquatic fauna and flora has been documented in several primate species to date, evolutionary contexts mechanisms behind emergence this behavior both human non-human primates remain largely overlooked. Yet, issue is particularly important for our understanding evolution, as hominins represent not only group with highest degree adaptedness environments, but also which tr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید