نتایج جستجو برای: their artifacts

تعداد نتایج: 2278788  

ژورنال: گلجام 2017

Emigrating Jews to Iran and other countries, known for handmade rugs craft, caused penetrating their beliefs into those countries’ traditional artifacts and also developing Jewish rugs. According to ostensible characteristics, Jewish rugs are ones which contain Judaic signs or Jewish Merchants’ signatures. Since 1850 Jewish rugs have been produced in main cities of Iran, e.g. Kashan...

Journal: :Forensic Science International: Digital Investigation 2020

2011
Hilda Tellioğlu

This chapter is about showing how artifacts impact engineering work processes by representing important issues of individual and collaborative design work. After summarizing the state of the art of engineering as a design process, artifacts and their representational role in design and engineering, a selection of rich descriptions of artifacts’ creation and use in engineering work including tea...

1996
Hardeep Singh Jun Han

Software engineering environments (SEE) provide facilities for assisting software developers to carry out activities associated with software projects. These software projects result in various artifacts such as design and source-code documents. Object management systems (OMS) of SEEs deal with the maintenance and management of software artifacts. This includes providing facilities for represen...

Journal: :British journal of anaesthesia 2014
G Reusz P Sarkany J Gal A Csomos

Real-time ultrasound guidance for any intervention relies on visualization of needle advancement towards a target. Unfortunately, correct identification of the needle tip is not straightforward, as artifacts always distort the image. The ultrasonic appearance of the needle is often degraded by reverberation, comet tail, side-lobe, beam-width, or bayonet artifacts, which can easily confuse an un...

Journal: :Computer Networks 2022

The lack of security measures among the Internet Things (IoT) devices and their persistent online connection gives adversaries a prime opportunity to target them or even abuse as intermediary targets in larger attacks such distributed denial-of-service (DDoS) campaigns. In this paper, we analyze IoT malware focus on endpoints reachable public Internet, that play an essential part ecosystem. Nam...

Banitālebi Dehkordi, Ānāhitā , Shokrpur, Shahriyār ,

Lock is a device that assures safety of human’s life. Iranian locksmiths, in addition to making locks and meeting the essential needs, valued the decorative aspects of such tools. Including pendants and movable types, these locks are portable and they are different from standard, ordinary ones. Artists in this field have incorporated a wide range of artistic, spiritual, cultural and aesthetic v...

Journal: :journal of medical signals and sensors 0

medical image registration methods which use mutual information as similarity measure have been improved in recent decades. mutual information is a basic concept of information theory which indicates the dependency of two random variables (or two images). in order to evaluate the mutual information of two images their joint probability distribution is required. several interpolation methods, su...

Journal: :Computer Methods in Applied Mechanics and Engineering 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید