Showing 61 - 80 results of 238 for search '(((aina OR ping) OR shen) OR (((spans OR ((lingo OR ligo) OR pings)) OR ssspinga) OR sping))', query time: 0.09s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66
  7. 67
  8. 68
  9. 69
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74
  15. 75

    EFRAG-European Commission Sustainability Standards & ISSB Standard-Setting Process (2022–2024) by Carungu, Jonida, Dimes, Ruth, Molinari, Matteo

    Published 2025
    “…This dataset comprises meeting agendas, detailed discussion papers, summaries, and audio recordings of public webcasts related to the EFRAG-European Commission Sustainability Standards and the International Sustainability Standards Board (ISSB). It spans from the initial standard-setting efforts (March 2022 for EFRAG SRB, July 2022 for ISSB) to November 2024. …”
    Get full text
    Dataset
  16. 76

    Evaluation of sustainable supply chain risk: evidence from the Iranian food industry by Tavakoli Haji Abadi, Yasamin, Avakh Darestani, Soroush

    Published 2021
    “…The final weight of the main and sub-criteria was obtained using the F-BWM method via LINGO software. Risk management in the sustainable supply chain has the role of identifying, analyzing and providing solutions to control risks. …”
    Get full text
    Article
  17. 77

    A security enhanced timestamp-based password authentication scheme using smart cards by Pathan, Al-Sakib Khan, Hong, Choong Seon

    Published 2007
    “…We show various types of forgery attacks against Shen et al.’s timestamp-based password authentication scheme and improve their scheme to ensure robust security for the remote authentication process, keeping all the advantages of their scheme. …”
    Get full text
    Article
  18. 78

    Development of coated peanut separator and frying skillet machine by Yusof, M Sallehuddin, Fadilullah, M Zul Nadzmi, Hassan, Suhaimi, Maksud, M Idris, Yunos, Muhamad Zaini

    Published 2018
    “…The groundnut is sticking and become like a ping pong size ball and the time consuming to fry is longer. …”
    Get full text
    Article
  19. 79

    Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes by Waqar, Ali, Sang, Jun, Naeem, Hamad, Naeem, Rashid, Soomro, Ali Raza

    Published 2015
    “…As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. …”
    Get full text
    Get full text
    Proceeding Paper
  20. 80

    Pricing efficiency of the 3-month KLIBOR futures contracts: An empirical analysis by Razak, Marina Abdul, Bacha, Obiyathulla Ismath

    Published 2009
    “…This article also examines several issues related to pricing efficiency. The study spans the contract's entire 10-year history, June 1996 to June 2006. …”
    Get full text
    Article