نتایج جستجو برای: an egypt poet
تعداد نتایج: 5701678 فیلتر نتایج به سال:
kashajam mahmood-ebne-hosein is one of the poets of second era in abbasi age. at first he worked as a cook in the court and then becamed famous as a poet and literary man by abi elhija hamdani .then by his son seif-ol-dole hamdani got attracted to egypt during his traveling. several books are remained after him such as a book of poem in which eulogy and description attained perfection.kashajam ...
The publication of Fourth Quarter, Judith Wright's latest volume of poetry, is a significant event, occurring as it does just thirty years after her hrst volume The Moving Image. In a way, the poems of Fourth Quarter crystallise many of the themes which have preoccupied the poet during those thirty years. At the same time, the poet has not lost her power to surprise us with her new and often qu...
We present POET, a scripting language designed for applying advanced program transformations to code in arbitrary programming languages as well as building adhoc translators between these languages. We have used POET to support a large number of compiler optimizations, including loop interchange, parallelization, blocking, fusion/fission, strength reduction, scalar replacement, SSE vectorizatio...
We have developed a pooled ORF expression technology, POET, that uses recombinational cloning and proteomic methods (two-dimensional gel electrophoresis and mass spectrometry) to identify ORFs that when expressed are likely to yield high levels of soluble, purified protein. Because the method works on pools of ORFs, the procedures needed to subclone, express, purify, and assay protein expressio...
The Symposium of Plato presents the demythologizing of the god Eros, that is, the rational clarification of his nature. At a dinner to celebrate the victory of the tragic poet Agathon in the Theatre, the guests all give speeches in honour of the god. Of the initial speakers, neither the comic poet Aristophanes nor the tragic poet Agathon can give more than a partial account of his nature, and i...
We evaluate the security of the recently proposed authenticated encryption scheme POET with regard to weak keys when its universal hash functions are instantiated with finite field multiplications. We give explicit constructions for weak key classes not covered by POET’s weak key testing strategy, and demonstrate how to leverage them to obtain universal forgeries.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید