Zobrazeno 1 - 10
of 7 808
pro vyhledávání: '"IRBIS"'
Autor:
Jerzy Kajetanowicz
Publikováno v:
Scientific Journal of the Military University of Land Forces, Vol 198, Iss 4, Pp 763-779 (2020)
The article presents the characteristics of the Ryś and Irbis wheeled armored personnel carriers (Polish abbrev. KTO) designed in Poland. They constituted a deep modernization of the Czechoslovakian SKOT medium wheeled armored transporter. The paper
Externí odkaz:
https://doaj.org/article/35b021d3d97d48a883de2326eed7bf0c
Autor:
Forman, Tomáš
This master thesis deals with the landing gear rebuild from tail gear to nose gear of the M-4 Irbis aircraft. The first chapter presents the aircraft in its current state and includes some technical data, too. The theoretical information about types
Externí odkaz:
http://www.nusl.cz/ntk/nusl-442836
Autor:
Koval Tetiana, Shevchenko Irina
Publikováno v:
Наукові праці Національної бібліотеки України імені В.І. Вернадського, Iss 44, Pp 472-481 (2016)
2012 in the Vernadsky National Library of Ukraine was introduced Automated Library Information System (hereinafter - ALIS) «IRBIS» as a typical integrated solutions in automation of traditional library technologies. Designed for library and informa
Externí odkaz:
https://doaj.org/article/da054815ae2944cf8fa679db51fa02a9
Autor:
Marchenko, Irina I.
Baikalozercon irbis sp. nov. (Figures 41–63) Female (Figs 41–53, n=10) Dorsal idiosoma (Fig. 41). Idiosoma pear-shaped, 1025–1060 long, 675–725 wide, divided into two shields that cover the entire dorsal idiosoma. Podonotal shield with festoo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0fbbd4b1039ad4bb14de2b91722ebc95
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Nowakowski, Przemyslaw
Publikováno v:
Journal of Vascular Surgery; 2024 Supplement, Vol. 79 Issue 4, p46S-46S, 1p
Publikováno v:
Proceedings of the Institute for System Programming of the RAS. 34:51-66
Static taint analysis can be used to find various security weaknesses and vulnerabilities in programs by discovering dataflow paths from taint sources to taint sinks. In most cases the data is called ”tainted” if it was obtained from an untrusted
Autor:
Svitlana H. Kovalenko
Publikováno v:
Інформаційні технології і засоби навчання, Vol 47, Iss 3, Pp 160-166 (2015)
The main purpose of libraries activities is to form integrated information space on the basis of pooling and using of resources and integration into regional, national, European and world space. However, on the way of cooperation there are some obsta
Externí odkaz:
https://doaj.org/article/493355d9c35b409d859d031f929e8e6c
Publikováno v:
Преподавание истории в школе. :45-50