نتایج جستجو برای: probable reuse
تعداد نتایج: 61332 فیلتر نتایج به سال:
Martin E. Mueller, 2004 [email protected] Reproduction Or Reuse Without Author’s Permission Not Allowed Technische Berichte der Universitaet Augsburg, Vol. 9, No. 17, 2004. Good, Better and Most Probable Recommendations Copyright by Martin E. Mueller, 2004 [email protected] Reproduction Or Reuse Without Author’s Permission Not Allowed Technische Berichte der Universitaet Augsburg, Vol. 9, No. 1...
sludge, which is produced as a by-product of all treatment processes, has considerable potential as a fertilizer and soil conditioner. many authorities now discharge the sludge after treatment directly to agricultural land in liquid form, while some others dewater and dry it first. in either case, with proper marketing, it is generally possible for an authority to earn revenue by this means, al...
Despite initial technical barriers having been overcome, organizational wide component reuse has not enjoyed universal acceptance. Research has identified social and organizational factors as probable causes. This paper describes the Social Factors for Reuse Model (SFR Model), a predictive capability model based on Keidel’s triadic model of the organization. It determines an organization’s read...
background: today, in many countries, wastewater treatment plants effluent is an important part of the renewable water resources. in this case, the effluent quality standards are developed and used is important. the aim of this study was to investigate the potential use of wastewater plants effluent restricted irrigation. methods: in this descriptive - analytical study, samples was collected fr...
code reuse attacks such as return oriented programming and jump oriented programming become the most popular exploitation methods among attackers. a large number of practical and non-practical defenses have been proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. however, a usual aspect among them is to consider the common behavio...
As the amount of information online continues to grow, a correspondingly important opportunity is for individuals reuse knowledge which has been summarized by others rather than starting from scratch. However, appropriate requires judging relevance, trustworthiness, and thoroughness others' in relation an individual's goals context. In this work, we explore augmenting judgements appropriateness...
Background and Objective: Environmental pollution due to dumping construction and demolition wastes has adverse effects on public health. This study aimed to select the best method for managing construction and demolition wastes disposal in Tehran by AHP. Materials and Methods: This research was a descriptive study. The study population consisted of environmental health experts in the field of...
Erik B. van den Akker, Steven J. Pitts, Joris Deelen, Matthijs H. Moed, Shobha Potluri, Jeroen van Rooij, H. Eka D. Suchiman, Nico Lakenberg, Wesley J. de Dijcker, André G. Uitterlinden, Robert Kraaij, Albert Hofman, Anton J. M. de Craen, Jeanine J. Houwing-Duistermaat, Gert-Jan B. van Ommen on behalf of the Genome of The Netherlands Consortium, David R. Cox, Joyce B. J. van Meurs, Marian Beekm...
Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید