نتایج جستجو برای: its engineering and geological parameters have been calculated. collapsed zone in abovementioned shaft has been determined and illustrated using microgravity data. we applied the new method to residual gravity anomaly curve of collapsed zone. finally
تعداد نتایج: 27146956 فیلتر نتایج به سال:
in this paper, a new formula is applied for the calculation of gravity anomalies from a cylinder model representing a geological body. compared to conventional methods, this new development allows the cylinder to be freely oriented in space. 38 gravity forward models are produced each of which anomaly attributes are calculated. then a linear relationship is established between attributes and so...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
abstract this study is an attempt to determine the effect of nano- technology education on science lesson for fifth grade in primary school in the city of kermanshah. this research is experimental and is conducted in the from of pre-test and post- test for the control group. an achievement test was administered to determine the rate of learning in the students. the research is an applied one. ...
now-a-days graphic design plays a major role in influencing culture, society, business, and customers, in such a way that one could look upon every individual as a potential customer. graphic designers seek to identify customers needs and find an intelligent solution for them. correct identification and understanding of those needs is the first step towards achieving ones goals. marketing knowh...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
abstract: the present study is about prophet ishmael, some parts of his life; his personality in the quran and the bible; and the comparison of the content of these two religious books. compilation of the study has been done with a new perspective and new presentation approach. since prophets have been human beings’ role model and their life has been a perfect example for humanity in all ages,...
in the name of allah , the compassionate the merciful abstract shath ( blasphemic utterace made during spiritual ) is a complicated concept that deserves reflection in gnosticism and sufism ( mysticism ) and estem and westem scholars have alwaya paid attention to it. although principal essence of gnostic belief is the holy divine law ,gnosticism has pure and unique thoughts . by glancing at t...
abstract amino acids are building blocks of proteins, and play a vital role in living beings existence and their functionality. the interaction of these compounds with metal ions is of great importance to biochemists, and chemists, because their functions can be utilized as a model in understanding enzymes mechanism for transport of metal ions to tissues. among twenty essential amino acids w...
fuzzy logic has been developed over the past three decades into a widely applied techinque in classification and control engineering. today fuzzy logic control is one of the most important applications of fuzzy set theory and specially fuzzy logic. there are two general approachs for using of fuzzy control, software and hardware. integrated circuits as a solution for hardware realization are us...
data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید