Development of Threshing Machine for Shatter-Resistant Sesame

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

development and implementation of an optimized control strategy for induction machine in an electric vehicle

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

15 صفحه اول

Upper extremity injuries due to threshing machine.

BACKGROUND The aim of this study was to report the patients who were admitted to our hospital with upper extremity injuries due to threshing machine, to determine the most appropriate classification, to estimate the treatment modalities, and to discuss the prevention methods. METHODS Twenty-five patients who had suffered injuries sustained by a threshing machine were retrospectively investiga...

متن کامل

Development and evaluation of a threshing machine for Prosopis africana seed

A decorticating machine for Prosopis Africana was developed, tested and evaluated. Prosopis Africana is popular in the Sub-Saharan Africa, with all the parts of the tree useful for medicinal purposes. This study focuses on the threshing of the pod to obtain the seed, which is the most widely used of the parts of the Prosopis Africana tree. Results from preliminary investigations carried out of ...

متن کامل

Threshing Eps Files

In this article we describe the CEP package for compressing EPS files. It belongs to the public domain and was released at the GUST meeting in Bachotek, 1997. The amount of disk space occupied by bitmap graphics is a well-recognized problem. For example, a 300 dpi picture (A4) contains ca 8700000 pixels; assuming that each CMYK pixel occupies four bytes, one obtains ca 35MB of disk space needed...

متن کامل

Shatter-proofing Windows

The Shatter attack uses the Windows API to subvert processes running with greater privilege than the attack code. The author of the Shatter code has made strong claims about the difficulty of fixing the underlying problem, while Microsoft has, with one exception, claimed that the attack isn’t a problem at all. Whether or not Shatter is indeed an exploit worth worrying about, it uses a feature o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Biosystems Engineering

سال: 2015

ISSN: 1738-1266

DOI: 10.5307/jbe.2015.40.2.110