نتایج جستجو برای: the tempest

تعداد نتایج: 16052748  

Journal: :Disaster Medicine and Public Health Preparedness 2012

Journal: :Theory and Practice in Language Studies 2023

The current paper shows colonialism as a concept and how European countries have created colonies in Australia, Asia, Africa, America, capturing overexploiting the colonies’ natural resources dominating natives. new nation discoveries accomplished by Europeans stuck Shakespeare’s mind, naming these “New World”. Tempest approaches Prospero’s colonial attitude Caliban’s postcolonial standpoint. W...

2004
J. S. Reid R. Koppmann T. F. Eck D. P. Eleuterio

A review of biomass burning emissions, part II: Intensive physical properties of biomass burning particles J. S. Reid, R. Koppmann, T. F. Eck, and D. P. Eleuterio Marine Meteorology Division, Naval Research Laboratory, Monterey, CA, USA Institut für Chemie und Dynamik der Geosphäre, Institut II: Troposphäre, Forschungszentrum Jülich, Germany GEST Center, University of Maryland, Baltimore County...

1994
N. J. A. Sloane

We all recognize 0, 1, 1, 2, 3, 5, 8, 13, . . . but what about 1, 2, 4, 6, 3, 9, 12, 8, 10, 5, 15, . . .? If you come across a number sequence and want to know if it has been studied before, there is only one place to look, the On-Line Encyclopedia of Integer Sequences (or OEIS). Now in its 49th year, the OEIS contains over 220,000 sequences and 20,000 new entries are added each year. This arti...

2005
NATHANIEL H. LEFF

Arthur Goldberger's comment is a tempest in a teacup. This is readily verified from the data presented in Table 1. This table reproduces from my original paper the coefficients for paired equations estimated with three different samples in which In S/N and In S/Y were the dependent variables. As the data of Table 1 indicate, in 7 of the 12 cases, the coefficients are identical through the secon...

1998
Markus G. Kuhn Ross J. Anderson

It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control the electromagnetic radiation it transmits. This can be used for both attack and defence. To attack a system, malicious code can encode stolen information in the machine’s RF emissions and optimise them for some combina...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید