نتایج جستجو برای: all exploration data including log
تعداد نتایج: 4396628 فیلتر نتایج به سال:
One of the major strengths of a Geographic Information System (GIS) in geosciences is the ability to integrate and combine multiple layers into mineral potential maps showing areas which are favorable for mineral exploration. These capabilities make GIS an extremely useful tool for mineral exploration. Several spatial modeling techniques can be employed to produce potential maps. However, these...
Purpose: the aim was to identify users' search strategies and the rate of using search strategies on the web. Method: It is a practical survey. The statistical population included all the postgraduate students in the first semester at Ferdowsi University of Mashhad. 95 students were selected by stratified random sampling method. To gather the data, log files were used. Findings: 12 search strat...
it is not possible to understand developments of a country’s culture and civilization without knowing his believes and myths. whether it is north or south, east or west, planes or mountains, sahara or deserts, here in iran every corner includes valuable and precious treasures which are known all over the world, and cultural – historical objects which are found here adorn all well known museums...
We consider a fixed communication network where (software) agents can move freely from node to node along the edges. A black hole is a faulty or malicious node in the network such that if an agent enters this node, then it immediately “dies.” We are interested in designing an efficient communication algorithm for the agents to identify all black holes. We assume that we have k agents starting f...
Dolomites and eruptive rocks are well-developed in the Permian Fengcheng Formation Junggar Basin China, which oil gas accumulated extensively. Until now, high-yield industrial flows have been obtained dolomitic tuff of second unit Formation, demonstrates huge exploration potential thick layer massive tuff. The lithology this area has gradually transformed from dolomite, to siltstone east west. ...
Under the robot model, we show that a robot needsΩ(n log d) bits of memory to perform exploration of digraphs with n nodes and maximum out-degree d. We then describe an algorithm that allows exploration of any n-node digraph with maximum out-degree d to be accomplished by a robot with a memory of size O(nd logn) bits. Under the agent model, we show that digraph exploration cannot be achieved by...
survival analysis is a set of methods used for analysis of the data which exist until the occurrence of an event. this study aimed to compare the results of the use of the semi-parametric cox model with parametric models to determine the factors influencing the length of stay of patients in the inpatient units of women hospital in tehran, iran. in this historical cohort study all 3421 charts of...
Let G be a finite cyclic group with generator α and with an encoding so that multiplication is computable in polynomial time. We study the security of bits of the discrete log x when given expα(x), assuming that the exponentiation function expα(x) = α is oneway. We reduce he general problem to the case that G has odd order q. If G has odd order q the security of the least-significant bits of x ...
this study was carried out to determine some biological characteristics including age, growth and somatic condition of carasobarbus luteus and capoeta trutta in the turkish part of the tigris river. the examined samples of c. luteus were distributed between ii-ix years of age. the length-weigth relations of females and males were calculated as log w =-4.7314 +3.0113 log fl and log w = -4.7631 +...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید