NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1
zadetkov: 4
1.
  • Bending Creep Behavior of H... Bending Creep Behavior of Hornbeam Wood
    Moosavi, Valiullah; Eslam, Habibollah Khademi; Bazyar, Behzad ... Drvna industrija, 01/2017, Letnik: 67, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    This study examined the effect of altitude on bending creep behavior of hornbeam lumber (Carpinus betulus). For this purpose, 9 hornbeam trees from three different altitudes (400, 800 and 1100 m) in ...
Celotno besedilo

PDF
2.
  • The effect of altitude on b... The effect of altitude on bending creep behavior hornbeam (Case Study, Nowshahr Meshelak Branch)
    valiallah moosavi; habiballah khademieslam; bahzad bazyar ... Majallah-i ṣanāyiʻ-i chūb va kāghaz̲-i Īrān, 12/2016, Letnik: 7, Številka: 3
    Journal Article
    Odprti dostop

    This study aimed to investigation the effect of altitude on the bending creep behavior of hornbeam lumber (Carpinus betuluse). For this purpose, 9 hornbeam trees from three different altitudes (400, ...
Celotno besedilo
3.
  • Puzanje drva graba pri savi... Puzanje drva graba pri savijanju
    Moosavi, Valiullah; Khademi Eslam, Habibollah; Bazyar, Behzad ... Drvna industrija, 01/2017, Letnik: 67, Številka: 4
    Paper
    Odprti dostop

    U radu su prikazani rezultati istraživanja utjecaja nadmorske visine staništa stabala na puzanje drva graba (Carpinus betuluse) pri savijanju. Za istraživanje je odabrano devet stabala graba iz šuma ...
Celotno besedilo

PDF
4.
  • Improving the Performance of Firewalls through Network Traffics Logs' Classification of Firat Dataset Using Decision Tree Algorithm
    Talaeepoor, Maryam; Soleimani Neysiani, Behzad; Jezi, Mohammad Davarpanah 2024 10th International Conference on Web Research (ICWR), 2024-April-24
    Conference Proceeding

    As long as a computer system is connected to the Internet, it is susceptible to attack as a victim. In computer networks, it becomes important to manage the network based on parameters such as ...
Celotno besedilo

Nalaganje filtrov