نتایج جستجو برای: sword and thorn 26 repetition

تعداد نتایج: 16852984  

2008
GORDON MOIR CLIVE RUGGLES Gordon Moir

'A cairn supported at its edge by large stones may be removed .... The ring which is left looks like a stone circle.' (Thorn, 1967, 65). Professor A. Thorn has surveyed a large number of archaeological sites (Thorn, 1967; 1971). These surveys provide the basis from which he deduces the existence of the Megalithic Yard (MY), Megalithic Geometry and Megalithic Astronomy. In considering his eviden...

Journal: :مجله دانشگاه علوم پزشکی شهید صدوقی یزد 0
رضا کچویی r kachuei مسعود امامی m emami

introduction: the most important subcutaneous fungal infections in man are caused by injury due to contaminated thistles and thorns. from an epidemiological point of view , it is important to recognize the fungi as well as their frequency of them in various thistles and thorns methods: the present research has been conducted on thorns and thistles of 16 regions including cities and villages of ...

Journal: :International Journal of Clinical Pediatric Dentistry 2010

2006
Shad Stafford Jun Li Toby Ehrenkranz

Once a host is infected by an Internet worm, prompt action must be taken before that host does more harm to its local network and the rest of the Internet. It is therefore critical to quickly detect that a worm has infected a host. In this paper, we enhance our SWORD system to allow for the detection of infected hosts and evaluate its performance. This enhanced version of SWORD inherits the adv...

2007
Daniel Bond Andrew Strelzoff Tim Rehner Ray Seyfarth

Historically the juvenile justice system in southern Mississippi kept records on cards which had to be indexed, filed and then retrieved to move children through the system. University of Southern Mississippi's SWORD system is a client-server database which was developed to improve the quality and reliability of child information. SWORD currently serves six southern Mississippi counties with 16...

Journal: :Simulation 2007
Shad Stafford Jun Li Toby Ehrenkranz

Once a host is infected by an Internet worm, prompt action must be taken before that host does more harm to its local network and the rest of the Internet. It is therefore critical to quickly detect that a worm has infected a host. In this paper, we enhance our SWORD system to allow for the detection of infected hosts and evaluate its performance. This enhanced version of SWORD inherits the adv...

Journal: :Tópicos, Revista de Filosofía 2013

Journal: :Proceedings. Biological sciences 1998
A L Basolo

Female poeciliid fishes of the sister genera Xiphophorus and Priapella share a preference for males with swords, despite phylogenetic information suggesting that swords arose in Xiphophorus after the divergence of the two genera. This study examines the strength of sword and body-size preferences in a representative of both genera. A comparison of the preference functions reveals that the stren...

Journal: :The Journal of Symbolic Logic 2012

2006
Philip Holmes Jerrold E. Marsden

Here x is an element of a finite-dimensional vector space (say R") or of a suitable Banach space of functions. In the latter case, (1) represents a partial differential equation (PDE). The control parameter p E R" is supposed to vary slowly in comparison with the evolution rate of a typical solution x ( t ) of (1). Thus we treat (1) as an m-parameter family of ODE'S. We are primarily interested...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید