Search alternatives:
chem » them (Expand Search), chee (Expand Search), chew (Expand Search), cheem (Expand Search), chewm (Expand Search)
che » chee (Expand Search), chew (Expand Search)
chern » cheern (Expand Search), chewrn (Expand Search), cheren (Expand Search)
chen » cheen (Expand Search), chewn (Expand Search), when (Expand Search)
sheers » sheets (Expand Search), sheer (Expand Search), shears (Expand Search)
her » here (Expand Search)
chem » them (Expand Search), chee (Expand Search), chew (Expand Search), cheem (Expand Search), chewm (Expand Search)
che » chee (Expand Search), chew (Expand Search)
chern » cheern (Expand Search), chewrn (Expand Search), cheren (Expand Search)
chen » cheen (Expand Search), chewn (Expand Search), when (Expand Search)
sheers » sheets (Expand Search), sheer (Expand Search), shears (Expand Search)
her » here (Expand Search)
-
61
-
62
-
63
Sheep as a Large-Animal Model for Otology Research: Temporal Bone Extraction and Transmastoid Facial Recess Surgical Approach
Published 2023“…However, a method for temporal bone extraction in sheep, which enables various experiments, has not been described, and literature on middle ear access is limited. …”
Get full text
Article -
64
Broadcast Yourself via Digital Marketing: A Case Study of ‘Saiful Nang’ (S/O 14903)
Published 2022“…This best practice company will expose the approaches of digital marketing that has been practised, digital skills and personal branding…”
Get full text
Monograph -
65
-
66
-
67
-
68
-
69
-
70
-
71
-
72
The Creative Industries Effects on Economic Performance in the Time of Pandemic
Published 2023Get full text
Article -
73
-
74
-
75
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
Published 2024“…Recently, an improved version of the GGH cryptosystem, namely the GGH-MKA cryptosystem, has been proven immune to the embedding-based attacks. …”
Get full text
Article -
76
-
77
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020Get full text
Article -
78
Usability analysis of marker-based augmented reality application for the microcontroller study
Published 2024“…C# programming language has also been used to provide the command for the interaction between the interface and the application. …”
Get full text
Article -
79
Introduction to LATTICE BOLTZMANN METHOD /
Published 2014“…The evolution of the technique has been discussed. This book also demonstrates the application of the lattice Boltzmann technique to solve real engineering problem. …”
text -
80
Evidence on Islamic Banks and Economic Growth: Experience in Malaysia
Published 2021“…By using a panel regression, the secondary data of 11 local Islamic banks has been extracted from annual reports while the real gross domestic product (GDP) has been collected from an International Monetary Fund (IMF) within a period from 2012 until 2019. …”
Get full text
Article