Samarqand-nāma [The Book of Samarqand]. Douchanbeh, Rāyzanī-yi farhangī-yi safārat-i Ǧumhūrī-yi islāmī-yi Īrān dar Tāǧīkistān, 2002, 392 p., glossaire, [33] p. de pl.
نویسندگان
چکیده
منابع مشابه
Professor Da-Yi Hu
Figure 1. Professor Da-Yi Hu, MD, FACC Professor Da-Yi Hu (Figure 1) was born in Henan province of central China, in 1946. He graduated from the Beijing Medical School (now Peking University Health Science Center) in 1970 and furthered his education both at SUNY-Oswego and University of Illinois from 1985 to 1987. Professor Hu has been a pioneer in the field of radio-frequency ablation technolo...
متن کامل2012 YI Awards Abstracts.indd
Head and neck squamous cell carcinoma (HNSCC) encompasses malignancies that arise in the mucosa of the upper aerodigestive tract. Recent high throughput DNA sequencing revealed HNSCC mutation profiles including genes that control several cancer cell characteristics, including dysregulation of proliferation and death signals, induction of inflammatory responses, and reprogramming of cell metabol...
متن کامل113-121-Yeong Yi An.indd
The breast can be diffusely affected by a variety of specifi c and unique disorders, including benign disorders that are closely related to physiologic changes and infl ammatory and infectious diseases, as well as by benign and malignant tumors. The clinical manifestations include unilateral or bilateral breast enlargement with/without a palpable masses, shrinkage and breast asymmetry. Thus, kn...
متن کاملHsieh , Yi - Ta Master of Arts Thesis Hsieh , Yi - Ta 2012 New Interaction Style PROTOTYPING
This is a project-based thesis work initiated by Nokia Research Center. The goal of this project is to investigate deformable user interfaces (DUIs) on mobile devices. Following background studies and identification of the research questions, various design methodologies were developed to encounter the new interaction style. An explorative experiment was designed to study the role of form in DU...
متن کاملCryptanalysis of the Yi-Lam Hash
This paper analyzes the security of a hash mode recently proposed by Yi and Lam. Given a block cipher with m-bit block size and 2m-bit key, they build a hash function with 2m-bit outputs that can hash messages as fast as the underlying block cipher can encrypt. This construction was conjectured to have ideal security, i.e., to resist all collision attacks faster than brute force. We disprove th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Abstracta Iranica
سال: 2005
ISSN: 0240-8910,1961-960X
DOI: 10.4000/abstractairanica.1023