نتایج جستجو برای: application method

تعداد نتایج: 2249570  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعت آب و برق (شهید عباسپور) - دانشکده مهندسی برق و کامپیوتر 1392

abstract according to increase in electricity consumption in one hand and power systemsreliability importance in another , fault location detection techniqueshave beenrecentlytaken to consideration. an algorithm based on collected data from both transmission line endsproposed in this thesis. in order to reducecapacitance effects of transmission line, distributed parametersof transmission line...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم پایه دامغان 1389

in this thesis, ‎‎using‎‎ ‎concept‎s‎ ‎of‎ ‎wavelet‎s‎ ‎theory ‎‎‎som‎e‎ ‎methods‎‎ ‎of‎ ‎th‎e ‎solving‎‎ ‎optimal‎‎ ‎‎con‎tr‎ol‎ problems ‎(ocps)‎‎. ‎g‎overned by time-delay systems is investigated. ‎th‎is‎ thesis contains ‎tw‎o parts. ‎‎first, the method of obtaining ‎o‎f ‎the‎ ‎‎ocps‎ in time delay systems by linear legendre multiwavelets is ‎ ‎presented‎.‎‎‎‎ the main advantage of the meth...

2006
Emma Tonkin Julie Allinson

As metadata providers increase in number and diversity, and additional contexts for metadata use are identified, issues of trust, provenance and identity gain in relevance. Use of a public-key infrastructure (PKI) is discussed for digital signature of metadata records, providing evidence of the identity of the signer and the authenticity of the information within the record. Two methods are sug...

2008
Matthijs Pontier Ghazanfar F. Siddiqui

Previous research indicates that self-help therapy is an effective method to prevent and treat unipolar depression. While web-based self-help therapy has many advantages, there are also disadvantages to self-help therapy, such as that it misses the possibility to regard the body language of the user, and the lack of personal feedback on the user responses. This study presents a virtual agent th...

Journal: :Acta scientiarum polonorum. Technologia alimentaria 2016
Semih Ötles Canan Kartal

Solid-Phase Extraction (SPE) is a sample preparation method that is practised on numerous application fields due to its many advantages compared to other traditional methods. SPE was invented as an alternative to liquid/liquid extraction and eliminated multiple disadvantages, such as usage of large amount of solvent, extended operation time/procedure steps, potential sources of error, and high ...

2007
Paul Libbrecht

The ActiveMath system is a web-based learning environment that integrates static mathematical content and interactive exercises with evaluated mathematical input from learners. Mathematical formulæ in ActiveMath are encoded in OpenMath and presented with regional notations. Users can input formulæ using the same notations via a formula editor or using plain-text input. Input to the editor is as...

2011
Michael Derntl Susanne Neumann Petra Oberhuemer

In digital repositories around the globe there is an abundance of available resources like learning objects, learning designs, teaching methods, and assessments. Building web-based learning opportunities by exploiting these resources is a complex endeavor with controversial motivational underpinnings. It requires provision of support for accessing, using and packaging the resources with interop...

Journal: :Expert Syst. Appl. 2011
Chiwoon Cho Seungsin Lee

Currently, BPM is considered as the suitable framework for today’s process-centric trends and BPM may result in considerable rewards for companies adopting it. For successful BPM initiative, the selection of suitable processes for BPM is very important. However, it is difficult to evaluate systematically and reasonably business processes for enterprises that plan to introduce BPM. This paper de...

Journal: :CoRR 2015
Yang Luo Qixun Zhang Qingni Shen Hongzhi Liu Zhonghai Wu

With the expansion of the market share occupied by the Android platform, security issues (especially application security) have become attention focus of researchers. In fact, the existing methods lack the capabilities to manage application permissions without root privilege. This study proposes a dynamic management mechanism of Android application permissions based on security policies. The pa...

2014
Claudia Reynolds G. Naveen Sundar

Mining the data from large-plain text enhances the retrieval of information from resources. This paper describes about the automatic discovery of part-whole patterns from the texts using knowledge. The Parts are found by learning semantic constraints and linking documents to the knowledge-base. Knowledge Discovery in text is a potential method, which automatically extracts the concepts and conc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید