Skip to main content
People
Isfahan University of Technology
Finding Contents or People
Selective Liquid Phase Oxidation of Ethyl Benzene to Acetophenone by Palladium Nanoparticles Immobilized on g-C3N4-rGO Composite as Recyclable Catalyst
APPLICATION POSSIBILITY OF ELECTROHYDRODYNAMIC TECHNIQUE FOR CELLULOSE EXTRACTION FROM BAGASSE: OPTIMIZATION USING RESPONSE SURFACE METHODOLOGY
APPLICATION POSSIBILITY OF ELECTROHYDRODYNAMIC TECHNIQUE FOR CELLULOSE EXTRACTION FROM BAGASSE: OPTIMIZATION USING RESPONSE SURFACE METHODOLOGY
APPLICATION POSSIBILITY OF ELECTROHYDRODYNAMIC TECHNIQUE FOR CELLULOSE EXTRACTION FROM BAGASSE: OPTIMIZATION USING RESPONSE SURFACE METHODOLOGY
Impact of process parameters on luminescence properties and nanostructure of YVO4:Eu phosphor
Supercritical CO2 extraction of chlorogenic acid from sunflower (Helianthus annuus) seed kernels modeling and optimization by response surface methodology
Integrated order acceptance and supply chain scheduling problem with supplier selection and due date assignment
Supercritical carbon dioxide extraction of trans-anethole from Foeniculum vulgare (fennel) seeds: optimization of operating conditions through response surface methodology and genetic algorithm
Application of coated green source carbon dots with silica molecularly imprinted polymers as a fluorescence probe for selective and sensitive determination of phenobarbital
Application of coated green source carbon dots with silica molecularly imprinted polymers as a fluorescence probe for selective and sensitive determination of phenobarbital
Predictions for the Detection and Characterization of Galactic Disk Microlensing Events by LSST
Tri-level transmission expansion planning under intentional attacks: virtual attacker approach - part I: formulation
Tri-level transmission expansion planning under intentional attacks: virtual attacker approach - part I: formulation
Tri-level transmission Expansion planning under intentional attacks: virtual attacker approach-part II: case studies
Tri-level transmission Expansion planning under intentional attacks: virtual attacker approach-part II: case studies
Pagination
First page
« First
Previous page
‹‹
…
Page
63
Page
64
Page
65
Page
66
Page
67
Page
68
Page
69
Page
70
Page
71
…
Next page
››
Last page
Last »
تحت نظارت وف بومی