-
61
-
62
Minutes of meeting. 5 March 1987
Published 1987“…Minutes of the meeting of Council of Irish County Associations (CICA), held on 5 March 1987. Three manuscript papers inserted in the minute book 1983-1987.…”
Get full text
Get full text
Minutes -
63
Minutes of meeting. 5 May 1981
Published 1981“…Typewritten minutes of meeting of Leitrim Association in London, held on 5 May 1981. Includes Silver Jubilee guest list and agenda for the meeting on 18 May 1981.…”
Get full text
Minutes -
64
-
65
Effects of kenaf/polyester blending ratios on physical and mechanical properties of yarns produced from ring spinning system
Published 2019“…This study observed on properties of kenaf/polyester hybrid yarns with different composition of kenaf that was spun using ring spinning system. The development of sliver was prepared by using carding process, the sliver was then inserted into ring spinning machine to produce hybrid yarns. …”
Get full text
Get full text
Get full text
Thesis -
66
-
67
Strange hadron production in pp and pPb collisions at root(NN)-N-s=5.02 TeV
Published 2020“…The transverse momentum (pT) distributions of Lambda, Xi(-), and Omega(-) baryons, their antiparticles, and K-S(0) mesons are measured in proton-proton (pp) and proton-lead (pPb) collisions at a nucleon-nucleon center-of-mass energy of 5.02 TeV over a broad rapidity range. The data, corresponding to integrated luminosities of 40.2 nb(-1) and 15.6 mu b(-1) for pp and pPb collisions, respectively, were collected by the CMS experiment. …”
Get full text
Get full text
Article -
68
Culture of five species of Malaysia indigenous freshwater microalgae
Published 2016“…Five species of Malaysia indigenous chlorophycean microalgae were grown in laboratory culture under the comparable environmental condition and the population doubling time (td) as well as maximum growth rate (μmax) each was evaluated. …”
Get full text
Proceeding Paper -
69
-
70
-
71
Achieving security for images by LSB and MD5
Published 2012“…This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. …”
Get full text
Article -
72
-
73
-
74
-
75
-
76
-
77
-
78
-
79
-
80