-
141
Terracotta figurines from the National and Military Museums in Sana’a, Yemen
Published 2007“…The thumb and forefinger were generally used to suggest the spinal column, rump, eye cavities, nose and breasts. …”
Get full text
Article -
142
Biomechanical Study of Posterior Lumbar Interbody Fusion: A Review
Published 2023“…Degenerative disc disease is a spinal disorder in which the vertebral disc helps protect nerves and increase spine flexibility that begins to deteriorate. …”
Get full text
Article -
143
Classification of electroencephalogram (EEG) for lower limb movement of post stroke patients using artificial neural network (ANN)
Published 2020“…Nowadays, many neurological conditions happen suddenly, such as stroke or spinal cord injury. This can cause chronic gait function impairment due to functional deficits in motor control. …”
Get full text
Get full text
Get full text
Thesis -
144
Wear study of Mg-SiCp reinforcement aluminium metal matrix composite
Published 2016“…The study further analysed the effects of different size variations of silicon carbide particles such as the coarse particle size, fine particle size, intermediate particle size and mixed particle size in the fabrication of the composites on the hardness and wear properties. The pin-on-disc test was also done at room temperature in a dry sliding wear condition. …”
Get full text
Get full text
Article -
145
Wear behavior of as-cast and heat treated triple particle size SiC reinforced aluminium metal matrix composites
Published 2009“…The wear test was carried out using a pin-on-disc type tribo-test machine under dry sliding condition. …”
Get full text
Article -
146
Histopathological effects of Eurycoma Longifolia jack extract (tongkat ali) on the prostate of rats
Published 2013“…These dysplastic changes were equivalent to low grade prostatic intraepithelial neoplasia PIN. Conclusion: E.L. root extract can cause abnormal proliferation in the prostatic epithelium and these changes are dose dependant. …”
Get full text
Article -
147
A comprehensive survey on ‘‘various decoupling mechanisms with focus on metamaterial and metasurface principles applicable to SAR and MIMO antenna systems’’
Published 2020“…Such techniques include the use of defected ground structure (DGS), parasitic or slot element, dielectric resonator antenna (DRA), complementary split-ring resonators (CSRR), decoupling networks, P.I.N or varactor diodes, electromagnetic bandgap (EBG) structures, etc. …”
Get full text
Article -
148
-
149
Wideband and multiband antennas for multi-configuration mode applications
Published 2023Get full text
Thesis -
150
-
151
Novel opto-electronic and plastic fibre sensors
Published 1998“…The middle POF is coupled to a red LED and emits light onto a flat target with the two outer fibres receiving the reflected light from the target and guiding it to two silicon PIN photodiodes. Theoretical investigations on the behaviour of the sensor are presented for ranges between 0 mm and 100 mm, and for targets with different reflectivities. …”
Get full text
Thesis -
152
Determination toxic effects of Hystrix Brachyura Bezoar extracts using cancer cell lines and embryo zebrafish (Danio rerio) models and identification of active principles through G...
Published 2020“…In vivo toxicity of PBs extracts found affecting tail detachment, hatching, craniofacial, brain morphology, soft tissues, edema, spinal, somites, notochord and cardiovascular system (brachycardia, disruption of blood circulation) deformities. …”
Get full text
Get full text
Article -
153
-
154
-
155
-
156
A novel fly optimization algorithm for swarming application
Published 2010Get full text
Proceeding Paper -
157
-
158
Control of mini autonomous surface vessel
Published 2010Get full text
Get full text
Proceeding Paper -
159
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
Published 2015“…As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. …”
Get full text
Get full text
Proceeding Paper -
160