نتایج جستجو برای: two methods

تعداد نتایج: 3820535  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده مهندسی 1387

abstract this paper discusses several commonly used models for strategic marketing¹ including market environmental analysis methods (i.e. swot and pest analysis) and strategic marketing tools and techniques (i.e. boston matrix and shell directional policy matrix)and shows how these models may help a firm to achieve its strategic goals. at first, the main reason for doing this research is de...

پایان نامه :0 1374

the following null hypothesis was proposed: h : there is no significant difference between the use of semantically or communicatively translates scientific texts. to test the null hypothesis, a number of procedures were taken first, two passages were selected form soyrcebooks of food and nutrition industry and gardening deciplines. each, in turn, was following by a number of comprehension quest...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده ادبیات و علوم انسانی 1391

the purpose of this two-phase, sequential mixed methods study was to find out whether there were any decencies between male and female ma students’ theses regarding the common features of academic writing such as syntactic complexity, means of integrating cited information, and organizing arguments. i chose 10 male written theses and 15 female written theses in tefl and linguistics. in the firs...

2010
Trevor J. M. Bench-Capon Henry Prakken

A formal two-phase model of democratic policy deliberation is presented, in which in the first phase sufficient and necessary criteria for proposals to be accepted are determined (the ‘admissible’ criteria’) and in the second phase proposals are made and evaluated in light of the admissible criteria resulting from the first phase. Argument schemes for both phases are defined and formalised in a...

Journal: :Discrete Event Dynamic Systems 2004
Paulo Tabuada George J. Pappas Pedro U. Lima

Abstraction is a natural way to hierarchically decompse the analysis and design of hybrid systems. Given a hybrid control system and some desired properties, one extracts and abstracted system while preserving the properties of interest. Abstractions of purely discrete systems is a mature area, whereas abstractions of continuous systems is a recent activity. In this paper we present a framework...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1387

چکیده: بررسی ادبیات مربوطه در کشور در زمینه یادگیری زبان انگلیسی نشان می‎دهد که علی‎رغم اهمیت املا در فرآیند یادگیری به طور عام و یادگیری زبان انگلیسی به طور خاص، این مولفه از جایگاهی متناسب با اهمیت آن برخوردار نیست و عمدتاً نادیده گرفته شده است. تحقیقات گسترده‎ای در خارج از کشور در مورد ماهیت این مولفه صورت گرفته است، در حالی که به جرأت می‎توان گفت در داخل کشور گامی در مورد درک ماهیت آن و فرآی...

Journal: :Multiscale Modeling & Simulation 2014
Benjamin Ganis Kundan Kumar Gergina Pencheva Mary F. Wheeler Ivan Yotov

We consider a fully implicit formulation for two-phase flow in a porous medium with capillarity, gravity, and compressibility in three dimensions. The method is implicit in time and uses the multiscale mortar mixed finite element method for a spatial discretization in a nonoverlapping domain decomposition context. The interface conditions between subdomains are enforced in terms of Lagrange mul...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

august wilson is undoubtedly one of the rare black playwrights whose works have attracted streams of attention and worldwide audience. the present study aims at analyzing fences and piano lesson which are two of the most successful plays in his pittsburgh cycle from the perspective of michel foucault’s theories and ideas. studying these two plays from foucault’s perspective opens new windows in...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده منابع طبیعی و علوم دریایی 1388

this research was conducted in two protect and destroy region in the middle zagros, in illam province. in order to identification of ecological species group and evaluate density of regeneration, effect of many factors such as protection, vegetation, physiographic factors, physical and chemical properties of soil in study locations were studied. to achieve these purpose number of 54 plots using...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید