منابع مشابه
Studies on length-weight and length-length relationships of a catfish Eutropiichthyes vacha Hamilton (Schilbeidae: Silurifo-
Present study describes the length-weight (LWR) and length-length (LLR) relationships of a freshwater catfish Eutropiichthyes vacha Hamilton from Indus River, Sindh, Pakistan. A total of 281 specimen of E. vacha were collected from fisherman?s catch from February 2005 to January 2006, are used for this study. The parameters a and b of the length-weight relationship were calculated as W= aLb are...
متن کاملObservations on oesophageal length.
The subject of oesophageal length is discussed. The great variations in the length of the oesophagus in individual patients is noted, and the practical use of its recognition in oesophageal surgery is stressed. An apprasial of the various methods available for this measurement is made; this includes the use of external chest measurement, endoscopic measurement, and the measurement of the level ...
متن کاملstudies on length-weight and length-length relationships of a catfish eutropiichthyes vacha hamilton (schilbeidae: silurifo-
present study describes the length-weight (lwr) and length-length (llr) relationships of a freshwater catfish eutropiichthyes vacha hamilton from indus river, sindh, pakistan. a total of 281 specimen of e. vacha were collected from fisherman?s catch from february 2005 to january 2006, are used for this study. the parameters a and b of the length-weight relationship were calculated as w= alb are...
متن کاملLength series on Teichmuller space
We prove that a certain series defines a constant function using Wolpert’s formula for the variation of the length of a geodesic along a Fenchel Nielsen twist. Subsequently we determine the value viewing it as function on the the Deligne Mumford compactification M1,1 and evaluating it at the stable curve at infinity. Conventions: 1. For γ an essential closed curve on a surface lγ(x) is the leng...
متن کاملNew High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Japanese journal of psychology
سال: 1938
ISSN: 0021-5236,1884-1082
DOI: 10.4992/jjpsy.13.1