Search alternatives:
spinnau » pinnau (Expand Search)
Showing 861 - 880 results of 6,721 for search '((((spinnau OR pinna) OR ping) OR (((spine OR line) OR find) OR sspine)) OR (pingn OR pin))', query time: 0.20s Refine Results
  1. 861
  2. 862
  3. 863
  4. 864
  5. 865
  6. 866
  7. 867
  8. 868

    An open-ended approach to enhance critical thinking skill in mathematics among secondary five normal (academic) pupils by Seoh, Bee Hua.

    Published 2008
    “…The second aim is to find out whether the use of the open-ended problems that are related to the real life situations will generate active mathematical discussion.…”
    Get full text
    Thesis
  9. 869
  10. 870

    Corporate governance : an empirical study of Malaysian companies by Neo, Roslyn Hui Zhi, Lim, Alfred Yung Way, Koh, Xin Yi

    Published 2008
    “…Specifically, we find that firm performance is positively associated with equity ownership concentration.…”
    Get full text
    Final Year Project (FYP)
  11. 871

    Organic donor-acceptor cocrystals for multiferroic applications by Wang, Zongrui, Zhang, Qichun

    Published 2021
    “…The cocrystallization strategy has provided an efficient route to fulfill room temperature magnetoelectricity in single phase owing to the long-range ordered π-π stacking (donor-acceptor assembled) network, long-lived excitons (with μs lifetime), spin orders (±1/2 s pin) and charge transfer (CT) dipoles in the assembled crystal lattice. …”
    Get full text
    Journal Article
  12. 872

    The Portevin-Le Chatelier effect of Cu-2.0Be alloy during hot compression by Zhu, Daibo, Wu, Na, Liu, Yang, Liu, Xiaojin, Jiang, Chaohua, Jiang, Yanbin, Zhao, Hongyun, Cui, Shuhui, Xie, Guilan

    Published 2023
    “…As the strain rate increases, the dislocations outpace the diffusion speed of the solute atoms, limiting their ability to effectively pin the dislocations, resulting in lower dislocation density and serration amplitude. …”
    Get full text
    Journal Article
  13. 873

    Compatability and equilibrium approach to slender concrete column design (dual project) by Toh, Yi Hui

    Published 2017
    “…This report evaluates and compares the proposed design method with the Australian code AS3600-2001 for slender concrete column. The failure loads of pin-end columns under short term loading and uniaxial bending are used as a pre-determined factor to analyse the data. …”
    Get full text
    Final Year Project (FYP)
  14. 874

    Search for Gravitational Waves Associated with Fast Radio Bursts Detected by CHIME/FRB during the LIGO–Virgo Observing Run O3a

    Published 2024
    “…A targeted search for generic GW transients was conducted on 40 FRBs. We find no significant evidence for a GW association in either search. …”
    Get full text
    Article
  15. 875

    Who polarises? Who targets? Parties’ educational speech over the long run by Gingrich, J, Giudici, A

    Published 2024
    “…We find this pattern for questions of spending and access. …”
    Journal article
  16. 876

    THE FEVER CODE / by Dashner, James, 1972- 593391

    Published 2016
    “…This is the book that holds all the answers. How did Wicked find the Gladers? Who are Group B? And what side are Thomas and Teresa really on? …”
  17. 877
  18. 878

    Tumor cell-intrinsic signals promoting tolerance and adaptation to oncogenic kinase inhibition by Flower, Cameron Timothy

    Published 2024
    “…Using commonly prescribed TK inhibitors (TKIs), I show that TK genetic status generally predicts whether or not a cell line will show any response to genotype-matched TKI (GM-TKI), but is insufficient to predict drug tolerance, the ability of a cell line to sustain proliferation under drug. …”
    Get full text
    Get full text
    Thesis
  19. 879
  20. 880

    Building and Automating Penetration Testing Labs in the Cloud : Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP / by Lat, Joshua Arvin, author 656358, Packt Publishing (Online service) 656336

    Published 2023
    “…Other tech professionals working on advancing their career in cloud security who want to learn how to manage the complexity, costs, and risks associated with building and managing hacking lab environments in the cloud will find this book useful.…”
    Get full text
    Get full text
    software, multimedia