نتایج جستجو برای: but in ultrasonic and thermal lysis methods

تعداد نتایج: 21854769  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده علوم انسانی 1393

as some definitions show, idioms are expressions whose meanings cannot be obtained from individual words. in every society, people use their own conceptions and feelings through different idioms and expressions. so every culture and society has their own idioms. some scholars proposed methods for translating idioms but baker’s strategies are very important and constructive. this research tried ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم پزشکی 1389

introduction: diabetes mellitus is an growing national and international public health concern. the number of people affected by diabetes in world by 2030 will be 69% in developing countries. regular physical activity plays a key role in the management of type 2 diabetes melitus, particularly glycemic control. it has been recommended that peoples with type 2 diabetes participate in moderate-int...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه مواد و انرژی - پژوهشکده سرامیک 1392

thermal barrier coatings (tbcs) are used to provide thermal insulation to the hot section components of gas turbines in order to enhance the operating temperature and turbine efficiency. hot corrosion and thermal shocks are the main destructive factors in tbcs which comes as a result of oxygen and molten salt diffusion into the coating. in this thesis atmospheric plasma spraying was used to dep...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی 1391

the study of air infiltration into the buildings is important from several perspectives that may be noted to energy and design of hvac systems, indoor air quality and thermal comfort and design of smoke control systems. given the importance of this issue, an experimental and numerical study of air infiltration through conventional doors and windows has been explored in iran. to this end, at fir...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده شیمی 1389

in this project, some new polyaspartimides, (pas)s, have been synthesized form michael addition reaction between new synthetic bismaleimide (bmi) and some aromatic diamines. a characteristic property of this polyaspartimides is a pendent carboxylic group, which introduced to these polymers from new bismaleimide. bismaleimides (bmi) is one of the interesting compounds, which can be self-polymeri...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده فنی 1393

a problem of computer vision applications is to detect regions of interest under dif- ferent imaging conditions. the state-of-the-art maximally stable extremal regions (mser) detects affine covariant regions by applying all possible thresholds on the input image, and through three main steps including: 1) making a component tree of extremal regions’ evolution (enumeration), 2) obtaining region ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده علوم پایه 1389

nowadays, the development of anti cancer drugs is an important subject in pharmacology. bisphosphonates (b.p) are a great choice for design and production of the types of drugs which not only could perform as anti cancer agents but also could inhibit the function of acetyl cholinesterase (ache). ache hydrolyzes the acetylcholine (which is a neurotransmitter in nervous system) using the oh in i...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده علوم 1392

the history of plant’s used for mankind is as old as the start of humankind. initially, people used plants for their nutritional proposes but after the discovery of medicinal properties, this natural ?ora became a useful source of disease cure and health improvement across various human communities. berberis vulgaris is one of the medicinal plants used in iranian traditional medicine. berberis ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم اجتماعی و اقتصادی 1389

abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید