نتایج جستجو برای: 2005 period

تعداد نتایج: 613128  

2018
Tetsuro Tsujimoto Hiroshi Kajio Takehiro Sugiyama

AIMS Diabetes-related complications have declined during the past two decades. We aimed to examine whether mortality in people with diabetes improved over time in the 1999 to 2010 National Health and Nutrition Examination Survey (NHANES). METHODS We conducted a prospective cohort study using 1999 to 2004 and 2005 to 2010 data from the NHANES. For primary analyses, we compared the unadjusted, ...

2013
Geum Joon Cho Log Young Kim Hye-Ri Hong Chang Eun Lee Soon-Cheol Hong Min-Jeong Oh Hai-Joong Kim

The objective of this study was to determine the trends in national rates of peripartum hysterectomy (PH) and uterine arterial embolization (UAE) in Korea. We used data collected by the Health Insurance Review & Assessment Service of Korea and analyzed data from patients who gave birth during the period from 2005 to 2008. There were 1785,178 deliveries during the study period, including 2636 ca...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده ادبیات و علوم انسانی 1391

‘romanticism’ and ‘romantic’ are among the most controversial terms in literature. most readers, when encountering these words, would think of the well-known period of romanticism of the first three decades of the nineteenth century and the great six english poets known as ‘the big six’ of this period. however, romanticism does not belong to certain artists in a special period; one may seek ele...

Journal: :International Journal of Cultural Property 2006

Journal: :European Journal of Industrial Relations 2022

This paper explores the impact of robot adoption on European regional labour markets between 1995 and 2015. Specifically, we look at effect usage industrial robots jobs employment structures across regions. Our estimates suggest that tends to be mostly small negative during period 1995–2005 positive 2005–2015 for majority model specifications. Regarding effects structures, find some evidence a ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده الهیات 1390

چکیده: یکی از دوره های مهم تاریخی ایران به لحاظ تأمین استقلال ملی مذهبی و حتی تأثیر آن بر فرهنگ و مذهب ایرانیان، دوره صفویه است. رسمیت دادن و رواج مذهب شیعه توسط شاه اسماعیل اول، یکی از مهمترین اقدامات این دولت محسوب می شود. بنابراین برای اجرای این سیاست، وی منصب صدارت را به عنوان منصبی مذهبی- حکو متی ایجاد کرد .این منصب از دوره ی تیموریان ایجاد شده بود ولی در اواخر این دوره اهمیت بیشتری یافت...

2014
Kui Liu Buli Fu Jiangrong Lin Yueguan Fu Zhengqiang Peng Qi’an Jin

Laboratory studies were conducted to determine the effect of temperature and cold storage on the performance of Tetrastichus brontispae (Ferriere) (Hymenoptera: Eulophidae), one of the major endoparasitoids against coconut hispine beetle, Brontispa longissima (Gestro) (Coleptera: Chrysomelidae). The results revealed that T. brontispae could successfully parasitize host pupae under all seven tes...

2016
Xin-Ran Li Zong-Qing Wang

The incorrect generic name Perisphaeria Burmeister, 1838 results from a mistake by Princis (1947). Perisphaeria is an incorrect spelling by Burmeister referring to Perisphaerus Serville, 1831. Princis (1947) incorrectly regarded Perisphaeria as proposed by Burmeister and as the senior synonym of Hyposphaeria Lucas, 1863, which is valid. The subfamilial name Perisphaeriinae based on Perisphaeria...

2008
Thomas Neubauer Andreas Ekelhart Stefan Fenz

IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security standards provide a holistic approach to mitigate these threats and legal acts demand their implementation, companies often refrain from the implementation of information security standards, especially due to high costs and the lack of evidence for a positive cost/benefit...

2008
Shareeful Islam Jan Jürjens

Compliance with law, industry standards, and corporate governance regulations are one of the driving factors for discovering security requirements. This paper aims to incorporate constraints from regulations through security requirements at an early stage of development. Constraints are extracted using a pattern based approach from legal texts of information security laws and policies derived f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید