Showing 61 - 80 results of 11,711 for search '((((pinnae OR pingat) OR ((pinn OR (sping OR swing)) OR sspingn)) OR five) OR (spie OR long))', query time: 0.12s Refine Results
  1. 61

    Minutes of meeting. 5 May 1981 by Leitrim Association, LA

    Published 1981
    “…Typewritten minutes of meeting of Leitrim Association in London, held on 5 May 1981. Includes Silver Jubilee guest list and agenda for the meeting on 18 May 1981.…”
    Get full text
    Minutes
  2. 62
  3. 63

    Letter from the Organising Secretary of the APL to J. J. Long by Anti-Partition League, APL

    Published 1939
    “…Typescript letter dated 25 April 1939, to J J Long, from the Organising Secretary, about a public meeting.…”
    Get full text
    Get full text
    Correspondence
  4. 64

    An investigation of packet scheduling algorithms for long term evolution-advanced by Mohd. Ramli, Huda Adibah, Hasan, Mohamad Kamrul, Ismail, Ahmad Fadzil, Hassan Abdalla Hashim, Aisha, Abdullah, Khaizuran

    Published 2012
    “…This paper investigates the current algorithms of CA and packet scheduling forthe Long Term Evolution-Advanced (LTE-A). In the beginning, the evolution from third generation (3G) to fourth generation (4G) is illustrated in terms of featured performance requirements and the integration of current and future radio access technologies, is also highlighted. …”
    Get full text
    Proceeding Paper
  5. 65

    The long-run and dynamic behaviors of wages, productivity and employment in Malaysia by Abdullah Yusof, Selamah

    Published 2008
    “…Purpose – This paper aims to examine the long-run and dynamic behaviors of real wage-employment-productivity relationship, using Malaysian manufacturing data, and to determine which related labor theories are supported. …”
    Get full text
    Article
  6. 66

    Long memory and volatility dynamics in the US dollar exchange rate by Caporale, Guglielmo Maria, Gil-Alana, Luis A.

    Published 2010
    “…We model both absolute values of returns and squared returns using long-memory techniques, being particularly interested in volatility modelling and forecasting given their importance for FOREX dealers. …”
    Get full text
    Article
  7. 67

    Cybervictimization of adults with long-term conditions: cross-sectional study by Alhaboby, Zhraa A., Barnes, James, Evans, Hala, Short, Emma

    Published 2023
    “…However, the scope of such experiences is not well documented among adults with long-term conditions, and the potential impact has not been examined from a public health perspective. …”
    Get full text
    Article
  8. 68
  9. 69

    Strange hadron production in pp and pPb collisions at root(NN)-N-s=5.02 TeV by Sirunyan, A. M., Tumasyan, A. R., Adam, Wolfgang, Ambrogi, Federico, Asilar, Ece, Md. Ali, Mohd. Adli

    Published 2020
    “…The transverse momentum (pT) distributions of Lambda, Xi(-), and Omega(-) baryons, their antiparticles, and K-S(0) mesons are measured in proton-proton (pp) and proton-lead (pPb) collisions at a nucleon-nucleon center-of-mass energy of 5.02 TeV over a broad rapidity range. The data, corresponding to integrated luminosities of 40.2 nb(-1) and 15.6 mu b(-1) for pp and pPb collisions, respectively, were collected by the CMS experiment. …”
    Get full text
    Get full text
    Article
  10. 70

    Culture of five species of Malaysia indigenous freshwater microalgae by Sallehudin, Nor Jannah, Mustapa, Mokhzanni, Mel , Maizirwan, Ahmad Raus, Raha

    Published 2016
    “…Five species of Malaysia indigenous chlorophycean microalgae were grown in laboratory culture under the comparable environmental condition and the population doubling time (td) as well as maximum growth rate (μmax) each was evaluated. …”
    Get full text
    Proceeding Paper
  11. 71

    Achieving security for images by LSB and MD5 by Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, O. Alhussainan, Sondos

    Published 2012
    “…This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. …”
    Get full text
    Article
  12. 72
  13. 73
  14. 74
  15. 75
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80