نتایج جستجو برای: penetration index

تعداد نتایج: 430530  

Journal: :Journal of Marine Systems 2021

Sea ice algae in the Southern Ocean have strong ecological and biogeochemical significance, providing a lipid-rich food-resource to keystone species such as Antarctic krill. Despite their importance, estimating seasonal or interannual changes algal production at circumpolar scale is not presently possible. We show that product of concentration irradiance penetrating into sea (Eice) explains 69%...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1381

هدف از این تحقیق ، توصیف وضعیت برخی از عوامل آمادگی جسمانی و ترکیب بدنی دانشجویان دختر دانشگاه علوم پزشکی تهران است . لذا متغیرهای تحقیق عبارتند از : آمادگی جسمانی ، شامل : استقامت عضلات خم کننده بالاتنه ، استقامت عضلات کمربند شانه، چابکی، استقامت قلبی-تنفسی و در بخش ترکیب بدنی شامل وزن -قد، درصد چربی ، شاخص توده بدن، شاخص نسبت قد به ریشه سوم وزن ‏‎‏‎ponderal index)hwr‎‏) ، شاخص نسبت محیط کمر ب...

2009
Kaiguang Zhao Sorin Popescu

a r t i c l e i n f o Keywords: Leaf area index LAI Airborne laser Forest ecosystems Lidar GLOBCARBON Carbon cycling Hemispherical photograph scale Lidar provides enhanced abilities to remotely map leaf area index (LAI) with improved accuracies. We aim to further explore the capability of discrete-return lidar for estimating LAI over a pine-dominated forest in East Texas, with a secondary goal ...

Journal: :journal of mining and environment 2016
h. dehghani n. mikhak beiranvand

one of the most important parameters used for determining the performance of tunnel boring machines (tbms) is their penetration rate. the parameters affecting the penetration rate can be divided in two categories. the first category is the controllable parameters such as the tbm technical characteristics, and type and geometry of the tunnel, and the second one is the uncontrollable parameters s...

Journal: :تحقیقات دامپزشکی 0
دکتر پرویز تاجیک

bovine oocytes matured in culture were denuded from cumulus cells with hyaluronidase and by repeat pipetting trough a fine pasture pipete and were inseminated with frozen-thawed spermatozoa in a protein-free bo medium containing 5m m-caffeine, l0 mg heparin/ml and with or without polyvinyl pyrrolidone (pvp) and different concentrations of hyaluronic acid. when oocytes were inseminated in the ab...

R Aboofazeli SA Mortazavi

Achieving a desirable percutaneous absorption of drug molecule is a major concern in formulating dermatological products. The use of penetration enhancers could provide a successful mean for this purpose. The aim of this study was to evaluate the effect of incorporating a few common penetration enhancers (in different concentrations) into a 0.5% w/w piroxicam (model drug) gel formulation, on th...

2009
Farkhod Alisherov

Penetration testing is one of the oldest methods for assessing the security of a computer system. The idea behind penetration testing methodologies is that the penetration tester should follow a pre-scripted format during test as dictated by the methodology. A penetration testing methodology was proposed in this research. It is also important to consider a policy that should be followed by both...

Journal: :Softw. Test., Verif. Reliab. 2011
William G. J. Halfond Shauvik Roy Choudhary Alessandro Orso

Penetration testing is widely used to help ensure the security of web applications. Using penetration testing, testers discover vulnerabilities by simulating attacks on a target web application. To do this efficiently, testers rely on automated techniques that gather input vector information about the target web application and analyze the application’s responses to determine whether an attack ...

Journal: :IACR Cryptology ePrint Archive 2007
Horng-Twu Liaw Jiann-Fu Lin Wei-Chen Wu

Recently, Liaw et al. proposed a hash based electronic traveler’s check system. They claimed that their scheme is secure. However, after analyses, we found that their scheme is vulnerable to key compromise impersonation and parallel session attack. Further, we will improve their scheme to avoid such an attack.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید