نتایج جستجو برای: 2005 in lab

تعداد نتایج: 16999461  

Journal: :IALLT Journal of Language Learning Technologies 1998

2005
Sven Behnke Jürgen Müller Michael Schreiber

This paper describes the humanoid robot Toni that has been designed to play soccer in the RoboCup Humanoid League. The paper details Toni’s mechanical and electrical design, perception, self localization, behavior control, and infrastructure. Toni is fully autonomous, has a low weight (2.2kg), and is much taller (74cm) than most servo-driven humanoid robots. It has a wide field of view camera, ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده مهندسی 1391

در این پژوهش، آلکیلاسیون بنزن با 1-دکن برای تولید آلکیل بنزن خطی (lab) در حضور کاتالیزورهای هتروپلی اسید داوسون نهش یافته مورد بررسی قرار گرفت. برای این منظور، ابتدا هتروپلی اسیدهای داوسون سنتز شده و سپس با میزان بارگذاری های مختلف بر روی پایه نانوساختار تیتانیا نشانده شد. هتروپلی اسیدهای داوسون نهش یافته، پس از کلسینه شدن در دمای مشخص، به عنوان کاتالیزور در واکنش تولید آلکیل بنزن خطی مورد استف...

2014
Jean Peccoud

Start of the lab: 2006 Size of the lab: Currently ten—size has fluctuated between five and 20 Research field: Systems and synthetic biology In 2005, I was working in the bioinformatics group of Pioneer Hi-Bred International, a subsidiary of DuPont. The company was downsizing its research and development effort. At the same time, synthetic biology was emerging as a new discipline, and I wanted t...

2002
Ankita Chakraborty Jayati Bhowal

Lactic acid bacteria (LAB) have attained major attention for their widespread use in the production of fermented foods (Farnwarth, 2005) which are characterized by hygienic safety, better organoleptic properties and perhaps the probiotic qualities (Savadogo et al., 2006). LAB are used as starter culture in fermentation and some of them are also natural component of intestinal micro flora (Fulle...

2014
Kui Liu Buli Fu Jiangrong Lin Yueguan Fu Zhengqiang Peng Qi’an Jin

Laboratory studies were conducted to determine the effect of temperature and cold storage on the performance of Tetrastichus brontispae (Ferriere) (Hymenoptera: Eulophidae), one of the major endoparasitoids against coconut hispine beetle, Brontispa longissima (Gestro) (Coleptera: Chrysomelidae). The results revealed that T. brontispae could successfully parasitize host pupae under all seven tes...

2016
Xin-Ran Li Zong-Qing Wang

The incorrect generic name Perisphaeria Burmeister, 1838 results from a mistake by Princis (1947). Perisphaeria is an incorrect spelling by Burmeister referring to Perisphaerus Serville, 1831. Princis (1947) incorrectly regarded Perisphaeria as proposed by Burmeister and as the senior synonym of Hyposphaeria Lucas, 1863, which is valid. The subfamilial name Perisphaeriinae based on Perisphaeria...

2008
Thomas Neubauer Andreas Ekelhart Stefan Fenz

IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security standards provide a holistic approach to mitigate these threats and legal acts demand their implementation, companies often refrain from the implementation of information security standards, especially due to high costs and the lack of evidence for a positive cost/benefit...

2008
Shareeful Islam Jan Jürjens

Compliance with law, industry standards, and corporate governance regulations are one of the driving factors for discovering security requirements. This paper aims to incorporate constraints from regulations through security requirements at an early stage of development. Constraints are extracted using a pattern based approach from legal texts of information security laws and policies derived f...

2010
Elena Ruiz Larrocha Jesús M. Minguet Gabriel Díaz Manuel Castro

This paper describes different proposals made at UNED, for post-graduated students, at the area of IT Services Management and specially trying to fill the gap, of paramount importance, of the treatment due in ITIL® (Information Technology Infrastructure Library) to Information Security Management. We analyze the treatment given to Information Security Management in ITIL, both versions 2 and 3, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید