Search Results/Filters    

Filters

Year

Banks




Expert Group










Full-Text


Issue Info: 
  • Year: 

    2025
  • Volume: 

    8
  • Issue: 

    1
  • Pages: 

    82-88
Measures: 
  • Citations: 

    0
  • Views: 

    6
  • Downloads: 

    0
Abstract: 

Nuclear emergency management prioritizes minimizing radioactive releases to protect public health and environmental systems. Radiological incidents can cause widespread ecosystem contamination with multi-generational consequences. This study employs predictive modeling to assess risks across all incident phases using computational tools and analytical methods.This study evaluates a hypothetical accident scenario involving a one-hour atmospheric release of 137Cs from a Russian KLT-40S small modular reactor (SMR) during peak operation in the Chabahar region. Utilizing the RASCAL computational code, a regulatory-endorsed tool for radiological emergency response, the research analyzes the isotope's dispersion dynamics over nine hours.This paper provides both a methodology for identifying hazard zones and a decision-support resource for emergency management officials during incident response. Implementation of fundamental protective actions, based on established protocols and real-time incident conditions, remains the responsibility of local authorities according to quantified risk levels.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 6

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1382
  • Volume: 

    9
Measures: 
  • Views: 

    2067
  • Downloads: 

    0
Abstract: 

در این مقاله به بررسی نحوه پیاده سازی الگوریتم chain code بر روی FPGA می پردازیم. الگوریتم chaincode یکی از الگوریتم های کد کردن تصویر می باشد که برای کد کردن لبه های یک شیء در تصویر استفاده می شود همچنین این الگوریتم می تواند عرض، ارتفاع، محیط و مساحت شیء را نیز به دست آورد. این الگوریتم در پردازش تصویر و شناسایی و مقایسه شیء ها و الگوها با هم کاربرد بسیاری دارد. در این پروژه ابتدا الگوریتم chain code با استفاده از VHDL که زبان توصیف سخت افزار می باشد، شبیه سازی شده و سپس برنامه نوشته شده به زبان VHDL بر روی مدل Spartan-II از FPGA های شرکت Xilinx پیاده سازی می شود.پردازنده مذکور قابلیت تولید chain code را برای یک تصویر با ابعاد حداکثر 256*256 پیکسل سیاه و سفید دارا می باشد که البته در صورت نیاز این ابعاد قابل گسترش می باشند. همچنین این پردازنده، طول، عرض، محیط و مساحت شیء موجود در تصویر را نیز علاوه بر تولید کد به دست می آورد.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2067

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Issue Info: 
  • Year: 

    1388
  • Volume: 

    17
Measures: 
  • Views: 

    304
  • Downloads: 

    0
Abstract: 

لطفا برای مشاهده چکیده به متن کامل (PDF) مراجعه فرمایید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 304

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Journal: 

خصوصی

Issue Info: 
  • End Date: 

    تیر 1373
Measures: 
  • Citations: 

    0
  • Views: 

    223
  • Downloads: 

    0
Keywords: 
Abstract: 

این طرح بخشی از طرح طراحی و ساخت دستگاه های «Bar. Code. Reader» است که برای استفاده در هتل ها، به عنوان کلید، طراحی شده اند. نمونه مورد نظر، پس از طراحی و ساخت مورد تست قرار گرفت. با توجه به نتایج مثبت آزمایش یک هزار سری از سیستم به سفارش کارفرما ساخته شد و تحویل گردید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 223

Issue Info: 
  • Year: 

    2021
  • Volume: 

    38
  • Issue: 

    601
  • Pages: 

    882-885
Measures: 
  • Citations: 

    0
  • Views: 

    597
  • Downloads: 

    0
Abstract: 

Background: Radioactive release materials in nuclear facilities causes environmental pollution, and absorption of radiations by respiration by people and staff in the area of the accident is a vital problem. The aim of this study was to stimulate the event using Radiological assessment system for consequence analysis (RASCAL) software and compare the results with those of Gaussian experimental model. Methods: In this study, the accident included Uanium hexafluoride (UF6) gas leakage in the environment from the storage areas of the Sooreh Company, Isfahan, Iran. The geographical distribution of radioactive material and the received amount of staff and people around the site were estimated at a radius of ten kilometers. Findings: Uranium hexafluoride gas leakage event had the highest amount of radioactivity release that caused absorbed dose to people and staff in the company fence line. Conclusion: Findings showed that Uranium hexafluoride would not threaten any deterministic effects on staff and people. Also, it is recommended to use software codes to calculate event and radiation risk

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 597

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

اعتضادی حمید

Journal: 

بندر و دریا

Issue Info: 
  • Year: 

    0
  • Volume: 

    27
  • Issue: 

    192
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    910
  • Downloads: 

    0
Keywords: 
Abstract: 

لطفا برای مشاهده متن کامل این مقاله اینجا را کلیک کنید.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 910

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    -
  • Issue: 

    8
  • Pages: 

    55-86
Measures: 
  • Citations: 

    0
  • Views: 

    742
  • Downloads: 

    0
Abstract: 

Terrorism is a phenomenon which considerable attention has been focused on in recent years. In this respect, the criminal code is one of mechanisms has been regarded to combat terrorism. Although the penal code is a tool to response the crimes of punishments of offenders, political entity of terrorism can separate the criminal code from its basic principles in order to combat terrorism procedures and establishing Tool-using for politicians. Notwithstanding this danger (risk), the criminal code has many privileges to the non-legal alternatives which based on the criminal code; it can be preferred to other methods like war. Still, the suggested method is creating a comprehensive method to combat terrorism entities which it is to employ every of these methods besides the others.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 742

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MAHMOUDZADEH KAMBIZ

Journal: 

TRANSLATION STUDIES

Issue Info: 
  • Year: 

    2004
  • Volume: 

    2
  • Issue: 

    6
  • Pages: 

    25-42
Measures: 
  • Citations: 

    0
  • Views: 

    1621
  • Downloads: 

    0
Abstract: 

Communication between and among bilinguals does not always take place in the same manner. In fact, interaction among bilingual individuals depends on the circumstances, topics under discussion, and even the mood of the interlocutors. For this reason, upon careful consideration of the communication between and among bilinguals, one will definitely have to deal with bilingualism in general and code-switching and code-mixing in particular. It is the objective of the present paper to introduce bilingualism in brief, and deal with code-switching and code mixing in detail, for bilinguals may follow different patterns in their conversation and adhere to one of the possible choices. Attempts will also be made to provide examples in either one of the cases when deemed necessary.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1621

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2024
  • Volume: 

    5
  • Issue: 

    1
  • Pages: 

    35-47
Measures: 
  • Citations: 

    0
  • Views: 

    22
  • Downloads: 

    1
Abstract: 

In this study, we attempted to demonstrate the interval-valued fuzzy code by extending the concept of an interval-valued fuzzy set. Further, we discussed the operations of the interval-valued fuzzy code. The interval-valued fuzzy soft code is introduced, and various related properties are investigated in this paper. Finally, we show that the operations of interval-valued fuzzy soft code are discussed. Through this paper, we use the set of integers modulo 2, that is = {0, 1}.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 22

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button