نتایج جستجو برای: carrying method

تعداد نتایج: 1681689  

2010
A. Yegin

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

Journal: :RFC 2008
Dan Forsberg Yoshihiro Ohba Basavaraj Patil Hannes Tschofenig Alper E. Yegin

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

Journal: :Electr. Notes Theor. Comput. Sci. 2003
Lennart Beringer Kenneth MacKenzie Ian Stark

In Robert Louis Stevenson’s novel [31], Dr Jekyll is a well-regarded member of polite society, while his alter ego Mr Hyde shares the same physical form but roams abroad communing with the lowest elements. In this paper we present Grail, a well-behaved first-order functional language that is the target for an ML-like compiler; while also being a wholly imperative language of assignments that tr...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2015
John W Terborgh

Efforts to understand the ecological regulation of species diversity via bottom-up approaches have failed to yield a consensus theory. Theories based on the alternative of top-down regulation have fared better. Paine's discovery of keystone predation demonstrated that the regulation of diversity via top-down forcing could be simple, strong, and direct, yet ecologists have persistently failed to...

Journal: :iranian journal of analytical chemistry 2014
kumble divya badiadka narayana

new, simple and cost effective spectrophotometric methods have been developed for the quality assessment of isoniazid (inh), in bulk and in pharmaceutical formulations by using novel reagents. the proposed methods involve the utility of ethyl 2-[(e)-(4-hydroxyphenyl) diazenyl]-3-oxobutanoate and benzil as novel reagents for the determination of inh. developed methods are based on the condensati...

Journal: :پژوهشهای جغرافیای انسانی 0
مهدی قرخلو دانشیار دانشکده‎ی جغرافیا، دانشگاه تهران حسین حاتمی نژاد استادیار دانشکده‎ی جغرافیا، دانشگاه تهران اکبر باغوند استادیار دانشکده‎ی محیط زیست، دانشگاه تهران مصطفی یلوه دانشجوی دکترای جغرافیا و برنامه‎ریزی شهری، دانشگاه تهران

extended abstract introduction the present paper examines the ecological footprint of kermanshah as the 9th largest city of iran. it also tries to answer the following question: dose the ecological environment of kermanshah support the basic needs of it's population? and are the biological systems of kermanshah able to answer all socio- economic questions related to different activities o...

Journal: :آمایش سرزمین 0
طاهره اردکانی عضو هیات علمی دانشگاه یزد واحد اردکان افشین دانه کار دانشیار دانشکده منابع طبیعی دانشگاه تهران ملیحه عرفانی عضو هیأت علمی دانشگاه زابل

every time a visitor sets foot in an ecotourism site, he/she causes a negative impact. this is an unavoidable fact. an ecotourism program initiates many public use activities that will have impacts ,both positive and negative. an ecotourism management plan seeks to minimize the negative impacts.therefore monitoring and managing of visitor impacts are fundamental ecotourism management strategie...

2009
M. H. Korayem A. Nikoobin

In this paper, a formulation is developed for obtaining the optimal trajectory of robot manipulators to maximize the load carrying capacity for a given point-to-point task. The presented method is based on open loop optimal control. The indirect approach is employed to derive optimality conditions based on Pontryagin's Minimum Principle. The obtained necessary conditions for optimality lead to ...

2006
Walid Bagga Stefano Crosta Refik Molva

The term proxy certificate is used to describe a certificate that is issued by an end user for the purpose of delegating responsibility to another user so that the latter can perform certain actions on behalf of the former. Such certificates have been suggested for use in a number of applications, particularly in distributed computing environments where delegation of rights is common. In this p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید