Skip to main content
People
Isfahan University of Technology
Finding Contents or People
Scattered Field Calculation From Microstrip Arrays Using the Combination of Discrete Bodies of Revolution and Domain Decomposition Methods
Scattered Field Calculation From Microstrip Arrays Using the Combination of Discrete Bodies of Revolution and Domain Decomposition Methods
Evaluation of the effects of zein incorporation on physical, mechanical, and biological properties of polyhydroxybutyrate electrospun scaffold for bone tissue engineering applications
Fabrication and characterization of a 3D scaffold based on elastomeric poly-glycerol Sebacate polymer for heart valve applications
Application of boehmite as a fiber coating for headspace solid-phase microextraction of chlorophenols from aqueous samples
Application of boehmite as a fiber coating for headspace solid-phase microextraction of chlorophenols from aqueous samples
Fully automated operational modal identification of regular and irregular buildings with ensemble learning
Valorization of walnut green husk (Juglans regia L.) through sequential electrohydrodynamic extraction of pectin and phenolics: Process optimization and multidimensional analysis
Valorization of walnut green husk (Juglans regia L.) through sequential electrohydrodynamic extraction of pectin and phenolics: Process optimization and multidimensional analysis
Valorization of walnut green husk (Juglans regia L.) through sequential electrohydrodynamic extraction of pectin and phenolics: Process optimization and multidimensional analysis
Hydrothermal as a synthesis method for characterization of structural, morphological and magnetic properties of Co-Al ferrite nanoparticles
Dealing With Inefficiencies of Electricity Markets by Internalization of Negative Externalities of the Operational Restrictions of Generating Units
Dealing With Inefficiencies of Electricity Markets by Internalization of Negative Externalities of the Operational Restrictions of Generating Units
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains
Pagination
First page
« First
Previous page
‹‹
…
Page
34
Page
35
Page
36
Page
37
Page
38
Page
39
Page
40
Page
41
Page
42
…
Next page
››
Last page
Last »
تحت نظارت وف بومی