نتایج جستجو برای: probable reuse

تعداد نتایج: 61332  

2005
Martin E. Mueller

Martin E. Mueller, 2004 [email protected] Reproduction Or Reuse Without Author’s Permission Not Allowed Technische Berichte der Universitaet Augsburg, Vol. 9, No. 17, 2004. Good, Better and Most Probable Recommendations Copyright by Martin E. Mueller, 2004 [email protected] Reproduction Or Reuse Without Author’s Permission Not Allowed Technische Berichte der Universitaet Augsburg, Vol. 9, No. 1...

Journal: :international journal of environmental research 0

sludge, which is produced as a by-product of all treatment processes, has considerable potential as a fertilizer and soil conditioner. many authorities now discharge the sludge after treatment directly to agricultural land in liquid form, while some others dewater and dry it first. in either case, with proper marketing, it is generally possible for an authority to earn revenue by this means, al...

2011
Hugo Rehesaar

Despite initial technical barriers having been overcome, organizational wide component reuse has not enjoyed universal acceptance. Research has identified social and organizational factors as probable causes. This paper describes the Social Factors for Reuse Model (SFR Model), a predictive capability model based on Keidel’s triadic model of the organization. It determines an organization’s read...

Journal: :تحقیقات نظام سلامت 0
حسن هاشمی دانشجوی دکترای مهندسی بهداشت محیط، کمیته تحقیقات دانشجویی دانشکده بهداشت، دانشگاه علوم پزشکی اصفهان، اصفهان، ایران افشین ابراهیمی استادیار، مهندسی بهداشت محیط، مرکز تحقیقات محیط زیست دانشگاه علوم پزشکی اصفهان، اصفهان، ایران عباس خدابخشی استادیار، گروه مهندسی بهداشت محیط، دانشکده بهداشت، دانشگاه علوم پزشکی شهرکرد، شهرکرد، ایران

background: today, in many countries, wastewater treatment plants effluent is an important part of the renewable water resources. in this case, the effluent quality standards are developed and used is important. the aim of this study was to investigate the potential use of wastewater plants effluent restricted irrigation. methods: in this descriptive - analytical study, samples was collected fr...

Journal: :isecure, the isc international journal of information security 0
a. a sadeghi f. aminmansour h. r. shahriari

code reuse attacks such as return oriented programming and jump oriented programming become the most popular exploitation methods among attackers. a large number of practical and non-practical defenses have been proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. however, a usual aspect among them is to consider the common behavio...

Journal: :Proceedings of the ACM on human-computer interaction 2021

As the amount of information online continues to grow, a correspondingly important opportunity is for individuals reuse knowledge which has been summarized by others rather than starting from scratch. However, appropriate requires judging relevance, trustworthiness, and thoroughness others' in relation an individual's goals context. In this work, we explore augmenting judgements appropriateness...

ژورنال: سلامت و محیط زیست 2017
دهقانی, محمدهادی, مومنی, منصور, نادری, مازیار, نبی زاده نودهی, رامین, پاست, ویدا, یغمائیان, کامیار,

Background and Objective: Environmental pollution due to dumping construction and demolition wastes has adverse effects on public health. This study aimed to select the best method for managing construction and demolition wastes disposal in Tehran by AHP. Materials and Methods: This research was a descriptive study. The study population consisted of environmental health experts in the field of...

Journal: :Blood 2016
Erik B van den Akker Steven J Pitts Joris Deelen Matthijs H Moed Shobha Potluri Jeroen van Rooij H Eka D Suchiman Nico Lakenberg Wesley J de Dijcker André G Uitterlinden Robert Kraaij Albert Hofman Anton J M de Craen Jeanine J Houwing-Duistermaat Gert-Jan B van Ommen David R Cox Joyce B J van Meurs Marian Beekman Marcel J T Reinders P Eline Slagboom

Erik B. van den Akker, Steven J. Pitts, Joris Deelen, Matthijs H. Moed, Shobha Potluri, Jeroen van Rooij, H. Eka D. Suchiman, Nico Lakenberg, Wesley J. de Dijcker, André G. Uitterlinden, Robert Kraaij, Albert Hofman, Anton J. M. de Craen, Jeanine J. Houwing-Duistermaat, Gert-Jan B. van Ommen on behalf of the Genome of The Netherlands Consortium, David R. Cox, Joyce B. J. van Meurs, Marian Beekm...

A. A Sadeghi F. Aminmansour H. R. Shahriari

Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...

Journal: :Nature 1984

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید