Showing 301 - 320 results of 1,367 for search '((((bin OR (swing OR ming)) OR (spinsae OR (spinn OR spine))) OR like) OR (ching OR (pin OR long)))', query time: 0.31s Refine Results
  1. 301

    The impact of a humanitarian disaster on the working approach of accountants: a study of contingent effects by Carungu, Jonida, Di Pietra, Roberto, Molinari, Matteo

    Published 2021
    “…The study aims to discover the contingent effects, based on the contingency theory, on accountants' work due to a disaster like COVID-19. Design/methodology/approach This is a qualitative study with an action research approach. …”
    Get full text
    Article
  2. 302

    Kelvin waves in a shoaling shallow sea by Jesuthasan, Vasthiampillai Joseph

    Published 2009
    “…The solution obtained is compared with that generated by the long-time limit of a numerical solution for the time dependent initial value problem. …”
    Get full text
    Thesis
  3. 303

    Design a photovoltaic system based on maximum power point tracking under partial shading by Ma’allin, Usama Abdullahi

    Published 2019
    “…Photovoltaic systems have been given special attention given their long-term potential advantages. Solar panels can produce maximum power at specific operating points called maximum power points (MPP). …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 304

    A Novel MIMO antenna integrated with a solar panel and employing AI-equalization for 5G wireless communication networks by Hussein, Humam, Elmunim, Nouf Abd, Atasoy, Ferhat, Virdee, Bal Singh, Elwi, Taha A., Rashid, Nasr, Jayanthi, Renu Karthick Rajaguru, Alibakhshikenari, Mohammad, Limiti, Ernesto

    Published 2024
    “…We demonstrate that the directivity of this antenna array can be precisely electronically reconfigured using PIN diode switches. Additionally, we show the feasibility of integrating solar panels with the proposed MIMO antenna array. …”
    Get full text
    Get full text
    Article
  5. 305

    Design of microstrip ultra wide band antenna with two notch filters for wireless communication by Abdulhasan, Raed Abdulkareem

    Published 2015
    “…In order to add reconfigurable characteristics to the patch antenna, two copper strips are putted on the slots to represent the ON and OFF switching status of an ideal Pin diode. By using this simple switching technique, the current distribution of the patch changes and enables the antenna to have four modes of operation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 306

    Theoretical analysis of photoparametric amplifier by Mohammed Elbireki, Majdi Farag

    Published 2010
    “…The second method is to use Optiwave software in implement is the photo parametric amplifier circuit. Photo diode PIN type has been used to detect any coming signal at the receiver circuit. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 307
  8. 308
  9. 309
  10. 310
  11. 311
  12. 312

    Identification of a novel method for differentiating human monocytic cell line into macrophages by Jeddi, Marjan

    Published 2020
    “…This research developed a method for producing macrophage-like cells under conditions that may stimulate in vivo using a monocytic cell (THP-1) and a human liver cell (HUH7). …”
    Get full text
    Thesis
  13. 313
  14. 314
  15. 315
  16. 316
  17. 317

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. …”
    Get full text
    Article
  18. 318

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. …”
    Get full text
    Article
  19. 319

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. …”
    Get full text
    Article
  20. 320

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2022
    “…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. …”
    Get full text
    Article