Showing 41 - 60 results of 10,937 for search '(((((pinna OR sspinna) OR hingga) OR (spike OR (spinn OR spink))) OR five) OR (spie OR pin))', query time: 0.12s Refine Results
  1. 41

    Minutes of meeting. 5 March 1987 by Council of Irish County Associations, CICA

    Published 1987
    “…Minutes of the meeting of Council of Irish County Associations (CICA), held on 5 March 1987. Three manuscript papers inserted in the minute book 1983-1987.…”
    Get full text
    Get full text
    Minutes
  2. 42

    Minutes of meeting. 5 May 1981 by Leitrim Association, LA

    Published 1981
    “…Typewritten minutes of meeting of Leitrim Association in London, held on 5 May 1981. Includes Silver Jubilee guest list and agenda for the meeting on 18 May 1981.…”
    Get full text
    Minutes
  3. 43
  4. 44
  5. 45

    Strange hadron production in pp and pPb collisions at root(NN)-N-s=5.02 TeV by Sirunyan, A. M., Tumasyan, A. R., Adam, Wolfgang, Ambrogi, Federico, Asilar, Ece, Md. Ali, Mohd. Adli

    Published 2020
    “…The transverse momentum (pT) distributions of Lambda, Xi(-), and Omega(-) baryons, their antiparticles, and K-S(0) mesons are measured in proton-proton (pp) and proton-lead (pPb) collisions at a nucleon-nucleon center-of-mass energy of 5.02 TeV over a broad rapidity range. The data, corresponding to integrated luminosities of 40.2 nb(-1) and 15.6 mu b(-1) for pp and pPb collisions, respectively, were collected by the CMS experiment. …”
    Get full text
    Get full text
    Article
  6. 46

    Culture of five species of Malaysia indigenous freshwater microalgae by Sallehudin, Nor Jannah, Mustapa, Mokhzanni, Mel , Maizirwan, Ahmad Raus, Raha

    Published 2016
    “…Five species of Malaysia indigenous chlorophycean microalgae were grown in laboratory culture under the comparable environmental condition and the population doubling time (td) as well as maximum growth rate (μmax) each was evaluated. …”
    Get full text
    Proceeding Paper
  7. 47
  8. 48
  9. 49

    Achieving security for images by LSB and MD5 by Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, O. Alhussainan, Sondos

    Published 2012
    “…This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. …”
    Get full text
    Article
  10. 50
  11. 51
  12. 52
  13. 53
  14. 54
  15. 55
  16. 56
  17. 57
  18. 58
  19. 59
  20. 60