Sökresultat
Filtrera
Filtyp
Din sökning på "*" gav 534580 sökträffar
Making Law Work in China
Educational linguistics in practice : Applying the local globally and the global locally
OC155: The first prospective evaluation of the IOTA phase 1 mathematical models to predict the character of an adnexal mass
An ultrasonic method for detection of fluid properties in the paranasal sinuses
We propose a method for detection of the degree of infection in the paranasal sinuses utilizing a previously published method whereby the viscosity in a sealed container may be measured using an ultrasound Doppler method. As ultrasound propagates in a liquid medium, due to attenuation, the resulting pressure gradient will cause the liquid to move in the propagation direction - the wellknown effect
Kartläggning av insatser för barn och ungdomar med läs- och skrivsvårigheter/dyslexi i Skåne län.
Singing Climate Politics into Existence: On the Territorialisation of Climate Change Policymaking
Omvårdnad vid stroke
Projective Area-Invariants as an Extension of the Cross-Ratio
Application of Solid-shell Elements to Laminated Glass Structures
Nulla poena sine lege parlamentaria? Democratic legitimacy and European criminal law
Forty Years of System Change: Lessons from the free city of Christiania
Reactive Sintering of Cu-Al, Ni-Al and Ni-Ti Powder Mixtures
Intermetallic compounds are a distinct group of materials having attractive properties and wide applications. In the present work, the formation of intermetallic compounds from elemental components in Cu-Al, Ni-Al and Ni-Ti systems has been studied. Metallic powders were mixed in stoichiometric ratios corresponding to CuAl2, NiAl and NiTi. Calorimetric studies were made using compacted disks as we
Vinnväxt-tävlingen - spelregler för vinnare, och förlorare
Topics in Authentication Theory
Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e., providing authentication protection agains an enemy equipped with unlimited computing power. Several topics in authentication theory are treated: