نتایج جستجو برای: control methods

تعداد نتایج: 2926900  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی خواجه نصیرالدین طوسی - دانشکده برق و کامپیوتر 1391

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم پایه دامغان 1389

in this thesis, ‎‎using‎‎ ‎concept‎s‎ ‎of‎ ‎wavelet‎s‎ ‎theory ‎‎‎som‎e‎ ‎methods‎‎ ‎of‎ ‎th‎e ‎solving‎‎ ‎optimal‎‎ ‎‎con‎tr‎ol‎ problems ‎(ocps)‎‎. ‎g‎overned by time-delay systems is investigated. ‎th‎is‎ thesis contains ‎tw‎o parts. ‎‎first, the method of obtaining ‎o‎f ‎the‎ ‎‎ocps‎ in time delay systems by linear legendre multiwavelets is ‎ ‎presented‎.‎‎‎‎ the main advantage of the meth...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1391

abstract lexical knowledge of complex english words is an important part of language skills and crucial for fluent language use (nation, 2001). the present study, thus, was an attempt to assess the role of morphological decomposition awareness as a vocabulary learning strategy on learners’ productive and receptive recall and recognition of complex english words. so 90 sophomores (female and ma...

پایان نامه :0 1374

the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم پزشکی 1389

introduction: diabetes mellitus is an growing national and international public health concern. the number of people affected by diabetes in world by 2030 will be 69% in developing countries. regular physical activity plays a key role in the management of type 2 diabetes melitus, particularly glycemic control. it has been recommended that peoples with type 2 diabetes participate in moderate-int...

پایان نامه :موسسه آموزش عالی غیردولتی رودکی تنکابن - دانشکده ادبیات و زبانهای خارجی 1383

abstract this study examined the relationship between noticing pronunciation and the improvement pronunciation by administering a 50 item story, as proficiency- test in order to investigate the effectiveness of noticing pronunciation on the improvement of pronunciation. accordingly 60 qualified students were selected and assigned to the two groups of experimental and control randomly, each gr...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1393

this thesis attempts to measure learning styles, self efficacy and intrinsic motivation as predictors of iranian ielts reading comprehension. in order to address this issue, a quantitative study was conducted on some randomly selected intact students at ferdowsi university. these two groups were assigned as they were undergraduate (ba=91) and graduate (ma =74) students; they were all aged betwe...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

Journal: :journal of research in health sciences 0
mohammad reza monazzam-esmaeelpour zahra hashemi rostam golmohammadi narges zaredar

background: noise pollution is currently a major risk factor in industries in both developed and developing countries . the present study assessed noise pollution in the knitting industry in iran in 2009 and presented a control method to reduce the rate of noise generation. methods: the overall noise level was estimated using the network environmental noise assessment method in sina poud textil...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید