نتایج جستجو برای: 2004 from karoun

تعداد نتایج: 5652110  

Journal: :J. Comput. Physics 2015
Max Duarte Zdenek Bonaventura Marc Massot Anne Bourdon

a Univ. Nice Sophia Antipolis, CNRS, LJAD, UMR 7351, 06100 Nice, France b CCSE, Lawrence Berkeley National Laboratory, 1 Cyclotron Rd. MS 50A-1148, 94720 Berkeley, CA, USA c Department of Physical Electronics, Faculty of Science, Masaryk University, Kotlářská 2, 611 37 Brno, Czech Republic d CNRS, UPR 288 Laboratoire EM2C, Grande Voie des Vignes, 92295 Châtenay-Malabry, France e Ecole Centrale ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی 1391

the present dissertation aims to investigate four-word lexical bundles in applied linguistics research articles by iranian and internationally-published writers. the aims of this study are two-fold: first of all, attempts have been made to create a comprehensive list of the most commonly used four-word lexical bundles categorized by their type and token frequency, their structural characteristi...

1990
F. A. Dawodu R. A. Oderinde A. Egunyomi

In west Africa, the alarming rate of land use intensification and the assumed deterioration of parkland species calls for assessments of locally valued non-timber forest product (NTFP) yielding populations. This study focused on the baobab tree, Adansonia digitata Linn., in Cinzana, Mali. Here by conducting biological inventories in different land use types and interviews we addressed the follo...

2005
Charles E. Leiserson

Problem 3. True or False, and Justify (12 parts) [84 points] Circle T or F for each of the following statements to indicate whether the statement is true or false, respectively. If the statement is correct, briefly state why. If the statement is wrong, explain why. The more content you provide in your justification, the higher your grade, but be brief. Your justification is worth more points th...

2008
Yevgeniy Dodis Leonid Reyzin Adam Smith

This survey presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: we attempt to minimize the assumptions we make about the data, and to present techniques that are broadly applicable wherever biometric inputs are used. Because biometric data comes from a variety of sources that are mostly outside of anyone’s co...

Journal: :Natural Hazards and Earth System Sciences 2018

Journal: :Annals of Business Administrative Science 2014

Journal: :دامپزشکی 0
جمیله پازوکی دانشیار گروه آموزشی زیست دریا، دانشکده علوم زیستی، دانشگاه شهید بهشتی، تهران محمود معصومیان دانشیار پژوهشی، بخش بهداشت و بیماری های آبزیان، مؤسسه تحقیقات شیلات ایران، تهران سید رضا سید مرتضائی مربی پژوهشی، بخش بهداشت و بیماری های آبزیان، مرکز تحقیقات آبزی پروری جنوب کشور. اهواز

a survey on endo-parasitic infections on barboid fishes of south- west of iran (khouzestan province) was carried out from spring 2007 to atumn 2009. altogether 296 specimens from five different fish species were examined, they are barbus grypus heckel, 1843; barbus sharpeyi günther, 1874; barbus esocinus heckel, 1843; barbus barbulus heckel, 1849 and barbus pectoralis heckel 1843. the fishes we...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید