Search Results/Filters    

Filters

Year

Banks




Expert Group










Full-Text


Writer: 

خلیل-کنزی

Issue Info: 
  • End Date: 

    مهر 1387
Measures: 
  • Citations: 

    0
  • Views: 

    510
  • Downloads: 

    0
Keywords: 
Abstract: 

روش المان محدود (FEM) یک روش عددی جهت حل تقریبی معادلات دیفرانسیل با مشتقات جزئی (PDE) و معادلات انتگرالی است و در موضوعات مختلف مهندسی مانند اتوماسیون، بیومکانیک، الکترومغناطیس، سیالات و.... کاربرد دارد. برای پیاده سازی روش های FEM می توان از بسته های نرم افزاری گوناگون استفاده کرد که یکی از بسته ها، نرم افزار ANSYS می باشد که یک نرم افزار همه منظوره جهت پیاده سازی های FEM و سایر مسائل عموما مهندسی مکانیک است. در این پروژه به سفارش کارفرما و به وسیله روش های المان محدود (FEM) و با استفاده از نرم افزارANSYS، تحلیل های دینامیکی، سینماتیکی، ارتعاش و حرارت موتور DC انجام و نتایج آن ضمن تحویل به کارفرما، در طراحی ساخت موتور DC Counter Rotating با توان 38kWو سایر موتورهای این خانواده استفاده شده است.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 510

Writer: 

خلیل-کنزی

Issue Info: 
  • End Date: 

    آبان 1388
Measures: 
  • Citations: 

    15
  • Views: 

    314
  • Downloads: 

    0
Keywords: 
Abstract: 

با توجه به نیاز صنایع نظامی کشور به موتورهای DC Counter Rotating، اهمیت استراتژیک این محصول برای کشور و غیرممکن بودن خرید این نوع موتورها از خارج از کشور، جهاد دانشگاهی خواجه نصیرالدین طوسی با توجه به داشتن سابقه طولانی در زمینه ساخت انواع ماشین های الکتریکی بر آن شد تا مجموعه ای را برای تولید انواع ماشین های Counter Rotating ایجاد کند. اولین طرح در این مجموعه ساخت یک موتور DC Counter Rotating با قدرت 38kW بود که برای ساخت آن طراحی الکترومغناطیسی، حرارتی، سیالاتی و مکانیکی الکتروموتور DC Counter Rotating با قدرت 38kW با دو محور چرخان مخالف هم برای کاربردهای خاص انجام شد، در کنار آن خط تولید، کنترل کیفیت و ساخت تجهیزات نیز انجام شد.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 314

Issue Info: 
  • Year: 

    1395
  • Volume: 

    1
Measures: 
  • Views: 

    565
  • Downloads: 

    0
Abstract: 

این پژوهش بر اساس تحلیل دینامیکی جریان گاز در داخل یک سانتریفیوژگازی بلند با استفاده از شرایط مرزی می باشد. در این پروژه ما بر پایه روش تفاضل محدود، با استفاده از کد برنامه نویسی Fortran و روش تکرار گوس سایدل و ژاکوبی و بر اساس نوع مش بندی مربعی با نقاط ثابت و دستگاه معادلات بقایی، 4 معادله غیر خطی بیضوی، تابع جریان، حالت گردابی، انرژی وسرعت Azimuthal و معادلات دیگر را تحلیل نمودیم. در این مقاله نوع مش بندی روتور از نوع متناوب بوده که 50 نقاط گرهی در راستای شعاعی و 100 نقاط گرهی در راستای محوری می باشد وهمچنین در این مش بندی مبحث مهم Claustering در مناطق مختلف روتور رعایت شده است. از طرفی خواص حرارتی دیواره سیلندر و کلاهک های انتهایی و همچنین ضریب انتقال حرارت بین سیلندر دوار و محیط اطراف اثر بسیار محدودی بر روی عملکرد جداسازی در یک سانتریفیوژ گازی بلند دارد.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 565

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Issue Info: 
  • Year: 

    1391
  • Volume: 

    19
Measures: 
  • Views: 

    472
  • Downloads: 

    0
Keywords: 
Abstract: 

لطفا برای مشاهده چکیده به متن کامل (PDF) مراجعه فرمایید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 472

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Author(s): 

STEVENSON J.

Journal: 

SURVIVAL

Issue Info: 
  • Year: 

    2001
  • Volume: 

    43
  • Issue: 

    4
  • Pages: 

    35-48
Measures: 
  • Citations: 

    1
  • Views: 

    229
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 229

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

POURSAEED FARZAD

Issue Info: 
  • Year: 

    2017
  • Volume: 

    20
  • Issue: 

    3 (77)
  • Pages: 

    143-178
Measures: 
  • Citations: 

    0
  • Views: 

    750
  • Downloads: 

    0
Abstract: 

The present essay discusses New Counter-Terrorism and its basic principles. As a whole, to confront terrorism or choosing a Counterterrorism strategy, three distinct approaches can be identified. These three approaches are: criminal, military and intelligence approaches. Both first two approaches are reactive in essence. They can be called to consideration after a terrorist action. While confronting neo-terrorism, including Takfiri terrorism, prevention is prior to reaction. It is because the terrorist activities of these groups are often irreparable. These groups can hardly be demolished due to their jelly structure. So, informational approach is recommended to face and deal with this new form of terrorism. According to this approach, different informational tactics and strategies can be adapted to firstly prevent the formation of the Takfiri groups and secondly to stop them coming to the decision of planning and performing an attack. Although adapting this approach does not lead to rejecting other approaches in new anti-terrorist strategy, it must be considered prior to the other two approaches and both criminal and military approaches must be the continuation of the informational one and not vice versa. So this is called Informational Counter Terrorism or ICT. It must be mentioned that neo Counter-terrorism should be active not a passive one. Active Counter-terrorism includes steps like: investigation, intelligence gathering techniques, inquiry, infiltration and surveillance.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 750

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

POURSAEED FARZAD

Issue Info: 
  • Year: 

    2017
  • Volume: 

    20
  • Issue: 

    3 (77)
  • Pages: 

    143-178
Measures: 
  • Citations: 

    0
  • Views: 

    1140
  • Downloads: 

    0
Abstract: 

The present essay discusses New Counter-Terrorism and its basic principles. As a whole, to confront terrorism or choosing a Counterterrorism strategy, three distinct approaches can be identified. These three approaches are: criminal, military and intelligence approaches. Both first two approaches are reactive in essence. They can be called to consideration after a terrorist action. While confronting neo-terrorism, including Takfiri terrorism, prevention is prior to reaction. It is because the terrorist activities of these groups are often irreparable. These groups can hardly be demolished due to their jelly structure. So, informational approach is recommended to face and deal with this new form of terrorism. According to this approach, different informational tactics and strategies can be adapted to firstly prevent the formation of the Takfiri groups and secondly to stop them coming to the decision of planning and performing an attack. Although adapting this approach does not lead to rejecting other approaches in new anti-terrorist strategy, it must be considered prior to the other two approaches and both criminal and military approaches must be the continuation of the informational one and not vice versa. So this is called Informational Counter Terrorism or ICT. It must be mentioned that neo Counter-terrorism should be active not a passive one. Active Counter-terrorism includes steps like: investigation, intelligence gathering techniques, inquiry, infiltration and surveillance.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1140

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    6
  • Issue: 

    21
  • Pages: 

    85-130
Measures: 
  • Citations: 

    0
  • Views: 

    648
  • Downloads: 

    0
Abstract: 

There are various connections between terrorist organizations and criminal groups. Among organized crime, the involvement of terrorist groups in drug trafficking has become increasingly widespread. "Narcoterrorism" or "drug-related terrorism" is a clear manifestation of the link between terrorism and transnational organized crime, which is reflected in two main concepts: Direct involvement of terrorists in the drug trade to finance their activities as well as the use of terrorist methods by drug trafficking organizations to facilitate the drug trade. Although the relationship and interaction between these two phenomena has been recognized globally, but the forms and nature of this interaction due to its ambiguity and complexity, has always been debated. The purpose of this study is to investigate the combination of terrorism and drug trafficking in a single phenomenon called narcoterrorism. It also provides an answer to the question of what is the link between these two global threats and, from the perspective of international law, what steps have been taken to combat this link. The findings of this study show that drug trafficking has become the most important source of funding for terrorist groups in the world. And as long as there is widespread supply and demand for drugs on a global scale, the fight against narcoterrorist threats will not be successful. In addition, the lack of a comprehensive and binding global legal document has made Counter-terrorism a problem. The present study is descriptive in nature and method and it is analytical and in terms of type, it is fundamental and the information contained in the research has been collected in a library method.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 648

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MITCHELL A.J.

Issue Info: 
  • Year: 

    2004
  • Volume: 

    20
  • Issue: 

    -
  • Pages: 

    15-34
Measures: 
  • Citations: 

    1
  • Views: 

    198
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 198

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2005
  • Volume: 

    14
  • Issue: 

    2
  • Pages: 

    127-144
Measures: 
  • Citations: 

    1
  • Views: 

    1743
  • Downloads: 

    0
Abstract: 

We devised a device for precise fish egg counting that incorporated three units electronic, mechanical and water network. In the device, a selector disc (mechanical unit) separates each egg from the batch and injects it into a fluid stream (water network) which is then detected by an inferared interrogator. The electronic detector generates a pulse to Counter circuit and then activate the numerical, display showing the number of the past eggs. There is also the option of a present system that allows programming number of the eggs that should be counted. The machine will stop when this preset number is reached. The efficiency of all parts were examind with trout eggs with an average diameter of 4 to 5.7mm. In the fish trial, we obtained an undercounting of 16 eggs. After adjustments, the undercounting reached unity.The selector disc was designed in the sizes of 4.5, 5.5 and 6.5mm to allow counting of most egg sizes. The first disc size allowed counting of 9000 eggs per hour. The counting capability increasd to 30,000 eggs per hour when more holes were punched in the disc. It is possible to increase the counting rate using higher velocity of disc rotation, mounting double discs or two dtectors with one disc.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1743

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 1
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button