نتایج جستجو برای: 063 and 004

تعداد نتایج: 16829387  

ژورنال: علوم زیستی ورزشی 2011
ابراهیم جوادی داریوش شیخ الاسلامی عباسعلی گائینی, علی اصغر رواسی, محمدرضا کردی, مهدی مقرنسی,

هدف از این پژوهش، مطالعة اثر چهار هفته بی تمرینی پس از هشت هفته تمرین سرعتی شدید بر عوامل خطرزای آسیب های التهابی آتروژنز بود. به این منظور 42 سر موش نر 3 ماهة نژاد ویستار به صورت تصادفی در دو گروه تجربی (24= تعداد با وزن 7 ±210 گرم) و کنترل (18= تعداد با وزن 3 ±211 گرم) قرار گرفتند. برنامة تمرینی ابتدا به مدت 12 هفته و هفته ای 3 جلسه، با مدت و شدت مشخص بین 85 تا 100 درصد و فراتر از 100 درصد VO...

Journal: :Review of Educational Research 2022

This meta-analysis examines the effects of sorting secondary students into different tracks (“between-school” tracking) or classrooms (“within-school” on efficiency and inequality levels an educational system. Efficiency is related to overall learning achievement students, whereas can refer “inequality achievement” (i.e., dispersion outcomes) opportunity” strength influence family background st...

2000
Lars R. Knudsen

Twofish is a 128-bit block cipher submitted as a candidate for the Advanced Encryption Standard (AES). It has a structure related to the Feistel structure and runs in 16 rounds. In this paper we consider mainly differentials of Twofish and show that there are differentials for Twofish for up to 16 rounds, predicting at least 32 bits of nontrivial information in every round. In addition, it hold...

2013
R Topaloglu C Yildiz E Taskiran E Korkmaz N Besbas S Ozen A Duzova N Akarsu F Ozaltin

Introduction Familial Mediterranean fever (FMF) is an autosomal recessive disease associated with a number of mutations of the MEFV gene. To date 246 variants responsible for the disease were identified, one such a variant is E148Q in exon 2. The role of E148Q variant in the development of FMF remains inconclusive. Some authors believe it causes the disease, whereas others favor the concept of ...

2012
Slawomir Goryczka Li Xiong Benjamin C. M. Fung

In this paper, we consider the collaborative data publishingproblem for anonymizing horizontally partitioned data atmultiple data providers. We consider a new type of “in-sider attack” by colluding data providers who may use theirown data records (a subset of the overall data) in addition tothe external background knowledge to infer the data recordscontributed by other d...

2009
Jens Grossklags Benjamin Johnson Nicolas Christin

We investigate a mixed economy of an individual rational expert and several naı̈ve near-sightedagents in the context of security decision making. Agents select between three canonical security ac-tions to navigate the complex security risks of weakest-link, best shot and total effort interdependencies.We further study the impact of two information conditions on agents’ choices. W...

2013
Miriam Butt

That is the way Miriam Butt begins her book. Apparently, she felt that the quote fits her introduction to case theory within grammatical traditions (Latin grammar is one) and their relationship to various notions of case within modern theoretical linguistics. In her introduction to the book, Butt states “...several issues must be dealt with. One is the issue of what “case” really means and what...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید