نتایج جستجو برای: treatment methods including pvs2
تعداد نتایج: 3586550 فیلتر نتایج به سال:
a problem of computer vision applications is to detect regions of interest under dif- ferent imaging conditions. the state-of-the-art maximally stable extremal regions (mser) detects affine covariant regions by applying all possible thresholds on the input image, and through three main steps including: 1) making a component tree of extremal regions’ evolution (enumeration), 2) obtaining region ...
abstract ion selective electrodes (ises) are electrochemical sensors that respond selectivity to the activity of ionic species. an ion-selective electrode is an electrochemical device that uses a thin selective membrane or film as the recognition element, and is an electrochemical half-cell equivalent to other half-cells of the zeroth (inert metal in a redox electrolyte). in common methods o...
We report the development of a cryopreservation protocol for the endemic Western Australian plant species Loxocarya cinerea (Restionaceae). Shoot tips from two genotypes, SXH404 and SXH804, were cryopreserved using the droplet-vitrification technique. Control explants, which were cryoprotected, but not cooled, showed regeneration for both genotypes (SXH404, 22.1 +/- 5.9%; SXH804, 67.7 +/- 9.6%)...
چکیده: بررسی ادبیات مربوطه در کشور در زمینه یادگیری زبان انگلیسی نشان میدهد که علیرغم اهمیت املا در فرآیند یادگیری به طور عام و یادگیری زبان انگلیسی به طور خاص، این مولفه از جایگاهی متناسب با اهمیت آن برخوردار نیست و عمدتاً نادیده گرفته شده است. تحقیقات گستردهای در خارج از کشور در مورد ماهیت این مولفه صورت گرفته است، در حالی که به جرأت میتوان گفت در داخل کشور گامی در مورد درک ماهیت آن و فرآی...
introduction: addiction is a habit or behavior that is often hard to quit. it is estimated that 190 million persons are substance users around the world. substance abuse creates tolerance after a while. shortly after taking the drug, a person will not enjoy as the beginning of its use that is why the amount of substance used is gradually increased. the purpose of this study was to find the reas...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید