نتایج جستجو برای: using cochrans formula

تعداد نتایج: 3451729  

2009
Berthold Crysmann

In this paper I shall present a treatment of lexical and grammatical tone and vowel length in Hausa, as implemented in an emerging bidirectional HPSG of the language based on the Lingo Grammar Matrix (Bender et al., 2002). I shall argue in particular that a systematic treatment of suprasegmental phonology is indispensible in an implemented grammar of the language, both for theoretical and pract...

2014
Andriy Yakymovych Siegfried Fürtauer Hans Flandorfer Herbert Ipser

ABSTRACT The partial and integral molar enthalpies of mixing of liquid Co-Li-Sn alloys were determined using drop calorimetry. The investigations were performed along six sections by the addition of lithium to mixtures with the compositions [Formula: see text]/[Formula: see text] ≈ 2:98, [Formula: see text]/[Formula: see text] ≈ 1:9, and [Formula: see text]/[Formula: see text] ≈ 3:17 as well as...

The contamination of melamine was evaluated in 69 infants along with follow up formula samples collected from the market for the first time in Iran using HPLC method. Since there are no previous data concerning the contamination level of melamine in all brands of infant formula samples consumed using the HPLC method in Iran, this study is the first investigation in this regard. Our results show...

2011
Amanda S. Azman Roberta L. Hudak

b) NIOSH, 626 Cochrans Mill Rd, P.O. Box 18070, Pittsburgh, PA 15236, USA; email: [email protected]. Despite advancements in engineering noise controls and the use of administra­ tive controls, miners are still dependent on hearing protection devices for prevention of noise-induced hearing loss. However, miners often complain of reduced audibility or confusion about identifying spoken words when w...

2015
Liangtao Zhu LIANGTAO ZHU Gordon G. Parker Ravindra Patankar Roshan D’Souza

Journal: :RFC 2014
Tirumaleswar Reddy Ram Mohan Ravindranath Muthu Arul Mozhi Perumal Alper E. Yegin

This document discusses some of the security problems and practical problems with the current Session Traversal Utilities for NAT (STUN) authentication for Traversal Using Relays around NAT (TURN) messages. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Fo...

2014
Darci Rush Andrea Jaeschke Jan A. J. Geenevasen Erik Tegelaar Jos Pureveen Michael D. Lewan Stefan Schouten Jaap S. Sinninghe Damsté

B. Yousefi M. A. Fariborzi Araghi

In this paper, we apply the Newton’s and He’s iteration formulas in order to solve the nonlinear algebraic equations. In this case, we use the stochastic arithmetic and the CESTAC method to validate the results. We show that the He’s iteration formula is more reliable than the Newton’s iteration formula by using the CADNA library.

Journal: مهندسی دریا 2007
Mahmoud Ghiasi,

This paper discusses the disturbance velocity and potential as well as the total velocity formulation for non lifting potential flow problem. The problem is derived based on the Cauchy method formulation. The adding and subtracting back technique is used to desingularize the integral equations. The desingularized boundary integral equations are then discretized. The discretized equations can be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید