نتایج جستجو برای: based methods

تعداد نتایج: 4266196  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان همدان - دانشکده ادبیات و علوم انسانی 1390

abstract this study is an attempt to determine the effect of nano- technology education on science lesson for fifth grade in primary school in the city of kermanshah. this research is experimental and is conducted in the from of pre-test and post- test for the control group. an achievement test was administered to determine the rate of learning in the students. the research is an applied one. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی علوم پایه زنجان - دانشکده شیمی 1391

in this thesis a calibration transfer method is used to achieve bilinearity for augmented first order kinetic data. first, the proposed method is investigated using simulated data and next the concept is applied to experimental data. the experimental data consists of spectroscopic monitoring of the first order degradation reaction of carbaryl. this component is used for control of pests in frui...

and A. Sheikhi, M. Farzan Sabahi, M. Modarres Hashemi,

In this paper, radar detection based on Monte Carlo sampling is studied. Two detectors based on Importance Sampling are presented. In these detectors, called Particle Detector, the approximated likelihood ratio is calculated by Monte Carlo sampling. In the first detector, the unknown parameters are first estimated and are substituted in the likelihood ratio (like the GLRT method). In the sec...

Journal: :Knowledge Eng. Review 1999
Dieter Fensel Rix Groenboom

The paper introduces a software architecture for the specification and verification of knowledge-based systems combining conceptual and formal techniques. Our focus is component-based specification enabling their reuse. We identify four elements of the specification of a knowledge-based system: a task definition, a problem-solving method, a domain model, and an adapter. We present algebraic spe...

2006
Indrakshi Ray Mahendra Kumar Lijun Yu

With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for location-based access control is needed that increases th...

and A. Sheikhi, M. Farzan Sabahi, M. Modarres Hashemi,

In this paper, radar detection based on Monte Carlo sampling is studied. Two detectors based on Importance Sampling are presented. In these detectors, called Particle Detector, the approximated likelihood ratio is calculated by Monte Carlo sampling. In the first detector, the unknown parameters are first estimated and are substituted in the likelihood ratio (like &#10the GLRT method). In the s...

2012
Annemieke Reijngoud Ulrich Endriss

We develop a formal model of opinion polls in elections and study how they influence the voting behaviour of the participating agents, and thereby election outcomes. This approach is particularly relevant to the study of collective decision making by means of voting in multiagent systems, where it is reasonable to assume that we can precisely model the amount of information available to agents ...

2007
Jungmi Oh Susan S. Fiorito Hira Cho Charles F. Hofacker

This study investigates two design factors of store atmosphere in relation to store image and consumers’ expectations of merchandise quality for web-based stores. We address this purpose through the use of the Stimulus–Organism–Response (S–O–R) model on which five hypotheses were drawn based on research conducted with brick-and-mortar and web-based stores. In order to test the hypotheses, four ...

2007
Muzammil Shahbaz Benoît Parreaux Francis Klay

Many of the formal techniques are orchestrated for interaction detection in a complex integrated solution of hardware and software components. However, the applicability of these techniques is in question, keeping in view time-to-market delivery and scarcity of available resources. The situation is even more intractable when little or no knowledge of components is provided. We introduce a novel...

2003
Valerie Maxville Chiou Peng Lam Jocelyn Armarego

This paper describes a process for selecting and evaluating candidates for component based software engineering. The process is aimed at developers sourcing components from third party vendors. Component metadata and a formalised specification of the ideal component, including context information, are used to drive the process. This specification is used to shortlist candidate components from c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید