Showing 2,241 - 2,260 results of 6,064 for search '(((((spinn OR spins) OR spink) OR shina) OR find) OR ((spine OR long) OR (pin OR ping)))', query time: 0.11s Refine Results
  1. 2241

    Safety in numbers: reflecting on the work of Artichoke as ‘adaptor-disruptor’ in reclaiming public space by Scarso, Jacek Ludwig, Jeske Thompson, Kirsten

    Published 2022
    “…The projects explored here were mostly realised long before our cities were shaped by the unprecedented restrictions caused by the pandemic; yet, they nonetheless all had to deal with substantial logistical and creative challenges, deriving from complex safety measures and an ever-changing urban and cultural landscape. …”
    Get full text
    Get full text
    Article
  2. 2242

    Alcohol, the overlooked drug: clinical pharmacist perspectives on addressing alcohol in primary care by Madden, Mary Teresa, Stewart, Duncan, Mills, Thomas, McCambridge, Jim

    Published 2023
    “…Background: Attempts to routinely embed brief interventions in health systems have long been challenging, with healthcare professionals concerned about role adequacy, legitimacy, and support. …”
    Get full text
    Get full text
    Article
  3. 2243

    Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning by Abood, Mohammed Salah, Hua, Wang, Virdee, Bal Singh, He, Dongxuan, Fathy, Maha, Yusuf, Abdulganiyu Abdu, Jamal, Omar, Elwi, Taha A., Alibakhshikenari, Mohammad, Kouhalvandi, Lida, Ahmad, Ashfaq

    Published 2024
    “…Additionally, the proposed Convolutional Neural Networks-Long Short-Term Memory (CNN-LSTM) approach demonstrates superiority over conventional ML algorithms, signifying its potential for real-time attack detection. …”
    Get full text
    Article
  4. 2244

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Article
  5. 2245
  6. 2246

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Article
  7. 2247

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Article
  8. 2248
  9. 2249

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2022
    “…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Article
  10. 2250

    Study on promote occupational safety and health practices in construction projects by Shahna, Ebrahim Awadh Mubarak

    Published 2018
    “…Safety is an important issue, but many employers do not feel it is vital to the success of companies. For a long time, the construction industry has been labeled as with poor OSHP and performance, which needs stern attention and in-depth research to put forward solutions to this issue. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 2251

    Single-sided magnetic nanoparticles imaging scanner for early detection of breast cancer by Abubakar Sadiq, Abdulkadir

    Published 2018
    “…Furthermore, the scanners have long signal acquisition time and high memory requirement. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 2252

    Faulty sensor detection using data correlation of multivariant sensor reading in smart agriculture with IOT by Malik, Ahmed Dhahir

    Published 2019
    “…Also, when the sensor gives a constant reading for a long time the system has got a fault in this sensor. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 2253

    Pulse electric field effect on cervical cancer cell: a plant based anti-cancer study by Ganeson, Suhassni

    Published 2018
    “…This necessitates alternate anti-cancer treatment as the conventional treatment have resulted in high number of long- term survivors who are left to deal with the aftereffect of their therapy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 2254

    Professional doctorate in health psychology : thesis portfolio (Whippey : 2018) by Whippy, Nicola

    Published 2017
    “…When starting this course, it took me a long time to decide on an original topic of research for the thesis, (Section C3, page 109) and I feel that at the beginning, when writing my ethics proposal, my thought process was much more basic. …”
    Get full text
    Thesis
  15. 2255

    توظيف الألعاب المحوسبة في تعلّم اللغة العربية وتعليمها لغير الناطقين بها للطلاب للمبتدئين في الجامعة الإسلامية العالمية بماليزيا أنموذجا... by Sahrir, Muhammad Sabri, Mohamed Gameil Ali, Hussein

    Published 2011
    “…In fact, there are many studies and research conducted in educational computer games at the moment, particularly in the areas other than Arabic especially in Western countries. However, we find that the attention of scholars for this research in Malaysia is still at an early age, especially among researchers and teachers of Arabic. …”
    Get full text
    Proceeding Paper
  16. 2256

    Information from pharmaceutical companies and the quality, quantity, and cost of physicians' prescribing: a systematic review by Spurling, Geoffrey K., Mansfield, Peter R., Montgomery, Brett D., Lexchin, Joel, Doust, Jenny, Othman, Noordin, Vitry, Agnes I.

    Published 2010
    “…The narrative synthesis finding of variable results was supported by a meta-analysis of studies of prescribing frequency that found significant heterogeneity. …”
    Get full text
    Article
  17. 2257
  18. 2258

    A constructivist grounded theory analysis of how counselling psychologists experience anti Muslim prejudice by Bibi, Majida

    Published 2020
    “…The central aim of this study was to explore accounts of counselling psychologists experience of AMP practices including how and in what forms AMP practices find them and how they process, manage and approach AMP practices. …”
    Get full text
    Thesis
  19. 2259

    New composite coagulant from agro-waste (tapioca peel) and polyaluminium chloride for primary landfill leachate treatment by Mohd Salleh, Siti Nor Aishah

    Published 2021
    “…Response surface methodology (RSM) was applied after using the conventional method of one-factor-at-a-time (OFAT) optimisation to find the optimum pH for the leachate sample and dosage of PACTPPg. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 2260