نتایج جستجو برای: farzad 2004

تعداد نتایج: 126361  

Journal: :EDIS 2022

Not only is fish a good source of protein, but it also provides essential fatty acids such as omega-3, vitamins vitamin D, and minerals selenium. However, consumers are concerned about exposure to mercury through consumption. The degree depends on both the amount type consumed. Additionally, recent studies have shown that Se can prevent poisoning. To better understand risk seafood consumption, ...

2017
Ryszard Haraszczuk

Wireless networks are commonly used by people. Market devices are equipped with the new security standard 802.11i. The standard announced in the middle of 2004 is commonly used to protect WLANs. Currently we can find the information that vulnerabilities were found in that standard. Then a question arises: Are WLANs compromised again? The article describes vulnerabilities which were discovered i...

Journal: :Zootaxa 2015
Kelly L Merrin Gary C B Poore

Iolanthe Beddard, 1886a is shown to be a senior synonyn of Acanthaspidia Stebbing, 1893, the replacement name for the preoccupied Acanthoniscus Sars, 1879 (Isopoda: Asellota: Acanthaspidiidae). Ischnomesus kussakini nom. nov. is erected as a replacement name for Ischnomesus antarcticus (Kussakin, 1982), preoccupied in this combination (Isopoda: Asellota: Ischnomesidae).

2011
Eduardo Mitio Shimbori Angélica Maria Penteado-Dias

The Aleiodes melanopterus (Erichson, 1848) species-group includes 21 species, of which seven are known from the Neotropical region: Aleiodes flavistigma Shaw, 1993, Aleiodes lucidus (Szépligeti, 1906), Aleiodes melanopterus, Aleiodes mexicanus Cresson, 1869, Aleiodes politiceps (Gahan, 1917), and the new species Aleiodes shaworumsp. n. and Aleiodes vassunungasp. n. Distribution ranges of Aleiod...

Journal: :SIAM J. Discrete Math. 2010
Anna Adamaszek Michal Adamaszek

We study the problem of recognizing graph powers and computing roots of graphs. We provide a polynomial time recognition algorithm for r-th powers of graphs of girth at least 2r + 3, thus improving a bound conjectured by Farzad et al. (STACS 2009). Our algorithm also finds all r-th roots of a given graph that have girth at least 2r+3 and no degree one vertices, which is a step towards a recent ...

2014
Richard Marion Ulmer George W. Woodruff Farzad Rahnema Bojan Petrovic Anna Erickson

I dedicate this work to my loving wife, without whom I would not have had the drive to get this far. My parents, for their nurturing love and support that has allowed me to succeed. I also dedicate this to my brothers and the rest of my family, who have shaped me into what I am today. iv ACKNOWLEDGEMENTS I wish to thank my advisor Dr. Farzad Rahnema for his guidance on this work, as well as Dr....

2012
Farzad Hatami

This paper reports on the basis of a questionnaire survey of the largest Iranian contractors a perspective of construction risk, and the effective actions taken for the management of such risks, particularly those of time and finances. The study, the first inIran, focuses on the assessment, allocation and management of construction risks. The paper also presents two types of riskmanagement meth...

2006
Brian Weatherson Alex Byrne Scott Soames

Author’s response to critical essays by Brian Weatherson, Alex Byrne, and Stephen Yablo on Philosophical Analysis in the Twentieth Century, Volume 2

Journal: :Brazilian journal of biology = Revista brasleira de biologia 2009
L M Gomiero G A Villares Junior F Naous

The objective of this study was to characterize the reproduction of Cichla kelberi in an artificial lake, located in the municipality of Leme, in the state of São Paulo, Brazil. Breeding occurred in spring, and summer. The L(50) and the L(100) of this species were 192 and 235 mm (L(50)), for males and females, respectively, and 290 mm (L(100)) for both sexes. Spawning was parceled. The oocytes ...

2007
Ivan Martinovic Frank A. Zdarsky Adam Bachorek Christian Jung Jens B. Schmitt

Web-based authentication is a popular mechanism implemented by Wireless Internet Service Providers (WISPs) because it allows a simple registration and authentication of customers, while avoiding high resource requirements of the new IEEE 802.11i security standard and backward compatibility issues of legacy devices. In this work we demonstrate two different and novel attacks against web-based au...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید