Showing 141 - 160 results of 2,639 for search '((((born OR toru) OR tor) OR (((torus OR torts) OR (your OR you)) OR (tours OR hours))) OR urn)', query time: 0.23s Refine Results
  1. 141

    How to Hold a Grudge : From Resentment to Contentment- the Power of Grudges to Transform Your Life / by Hannah, Sophie, 1971- author 649175

    Published 2019
    “…With this brilliant and hilarious guide, you will be able to grudge your way to your happiest, most optimistic, and most forgiving self."…”
    text
  2. 142

    Evaluating the Impact of Urban Consolidation Center and Off-Hour Deliveries on Freight Flows to a Retail District Using Agent-Based Simulation by Mepparambath, Rakhi Manohar, Cheah, Lynette, Zegras, P Christopher, Alho, André Romano, Sakai, Takanori

    Published 2024
    “…In response, policy makers have explored various freight management initiatives, including urban consolidation centers (UCC) and off-hour deliveries (OHD). This study examines the impact of these initiatives on freight flows to a retail district in Singapore. …”
    Get full text
    Article
  3. 143

    Comparative Analysis of Conventional and Modern High-Rise Hotels in Penang Based on Hourly Simulation of Cooling Load Performance Using Design Builder by Abdul Nasir, Muhammad Hafeez, Hassan, Ahmad Sanusi, Abdul Nasir, Aimi Salihah, Mohd Danuri, Mohd Suhaimi, Mohd Nawi, Mohd Nasrun, Deraman, Rafikullah

    Published 2023
    “…In assessing the thermal performance of the hotel façade, a case study of the conventional and modern high-rise city hotels in Penang are selected to undergo hourly cooling load simulation in the hotel guestroom using the DesignBuilder simulation program in establishing the hotel’s energy efficiency performance. …”
    Get full text
    Article
  4. 144
  5. 145
  6. 146

    Cybersecurity Blue Team Strategies : Uncover the secrets of blue teams to combat cyber threats in your organization / by Sehgal, Kunal, author 656353, Thymianis, Nikolaos, author 656355, Packt Publishing (Online service) 656336

    Published 2023
    “…Cybersecurity Blue Team Strategies is a comprehensive guide that will help you extend your cybersecurity knowledge and teach you to implement blue teams in your organization from scratch. …”
    Get full text
    Get full text
    software, multimedia
  7. 147

    Mu (em-power-you) : a jewelry brand inspired by the stories of different communities by Cho, Cecilia Hyunjae

    Published 2021
    “…M^u (pronounced: em-power-you) is a handmade jewelry brand conceived to empower and transform. …”
    Get full text
    Final Year Project (FYP)
  8. 148
  9. 149
  10. 150
  11. 151
  12. 152

    Public perceptions on tree breeding solutions to Ash dieback (YouGov survey data) by Jepson, P, Arakelyan, I

    Published 2017
    “…The data was generated from a questionnaire survey adminstered by YouGov in March 2016. A second data set available on ORA relates to a similar survey of UK publics attending countryside events.…”
    Dataset
  13. 153

    Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization / by Rains, Tim, author 656361, Youngblood, Timothy, writer of foreword 656362, Packt Publishing (Online service) 656336

    Published 2023
    “…By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.…”
    Get full text
    Get full text
    software, multimedia
  14. 154

    Who2chat: A Social Networking System for Academic Researchers in Virtual Social Hours Enabling Coordinating, Overcoming Barriers and Social Signaling by Park, Soya, Song, Jaeyoon, Karger, David R., Malone, Thomas W.

    Published 2024
    “…We introduce a system called Who2chat to tackle the challenge and facilitate connections of researchers in virtual social hours. Who2chat allows academic researchers to create a research profile and express their research interests, find researchers with similar interests, overcome social barriers, and coordinate and start video chats, all within a single interface. …”
    Get full text
    Article
  15. 155
  16. 156
  17. 157
  18. 158
  19. 159
  20. 160