Showing 261 - 280 results of 12,431 for search '(((ceers OR cers) OR (bears OR (beens OR (teens OR tens)))) OR ((beer OR bear) OR peer))', query time: 0.40s Refine Results
  1. 261

    Synthesis of a π-extended azacorannulenophane enabled by strain-induced 1,3-dipolar cycloaddition by Zhang, Xinjiang, Mackinnon, Marc R., Bodwell, Graham J., Ito, Shingo

    Published 2022
    “…The first example of a cyclophane bearing a nitrogen-containing buckybowl was synthesized via sequential 1,3-dipolar cycloaddition and palladium-catalyzed intramolecular cyclization. …”
    Get full text
    Journal Article
  2. 262

    Bitcoins in the Malaysian Economy by Miraz, Mahadi Hasan, Mohd Sharif, Kamal Imran, Hassan, Mohamad Ghozali, Ismail, Mohd Azril, Ahmad Mahyadin@Mahidin, Fariza

    Published 2021
    “…A bitcoin first released by Satoshi Nakamoto in 2008. It is a peer-to-peer (direct connections without an intermediary), open-source encryption system, where transactions occur through a public directory called a blockchain. …”
    Get full text
    Article
  3. 263

    Basic geotechnical characteristic of soft clay stabilised with cockle shell ash and silica fume by Suwito, Anang Rustanto, Muzamir, Hasan, Muhammad Syamsul Imran, Zaini

    Published 2024
    “…Soft clay soils can present challenges such as expansion, high malleability, limited water flow, and reduced load-bearing capability especially in areas with periodic rainfall. …”
    Get full text
    Article
  4. 264

    Yayasan UMPSA reaches out to Bentong community, donates RM200,000 for Early Education Assistance and Excellence Incentive by Mimi Rabita, Abd Wahit

    Published 2024
    “…BENTONG, 29 June 2024 - Yayasan UMPSA presented donations to ten families consisting of single mothers and families in need around Bentong in an effort to reach out and support the local community.…”
    Get full text
    Newspaper
  5. 265

    P4-network : a networking infrastructure for intra-aircraft cabin wireless communication by Pham, Chau Khoa.

    Published 2009
    “…The project focuses on peer-to-peer communication schemes, and en-compasses the use of redundant communication paths as a method to address the problem of line-of-sight blocking. …”
    Get full text
    Final Year Project (FYP)
  6. 266

    Distributed execution of workflow by Khademi Hedayat, Maryam

    Published 2009
    “…The main reasons which led us to this selection are: (i) there is few existing work on partitioning workflow, specially as a means of accelerating workflow execution; (ii) several systems have been developed using three main enactment models (i.e., centralized, hierarchical, and distributed models), but most of them focus on centralized execution control while the existing hierarchical and distributed models still have problems such as high overhead in communication amongst the distributed parties; and (iii) data movement mechanisms are divided into: centralized, mediated, and peer-to-peer models. …”
    Get full text
    Thesis
  7. 267

    Security in mobile ad hoc networks by Choy, Sok Sien.

    Published 2008
    “…Mobile Ad Hoc Networks, or MANETs, have recently gained much attention in the research community in anticipation of pertinent applications in converging communications services. The proliferation of peer-to-peer products has rendered MANET security an imminent issue. …”
    Get full text
    Thesis
  8. 268

    Young adolescents’ experiences and views on eating and food by Gilmour, A, Gill, S, Loudon, G

    Published 2020
    “…Contrary to previous research, the adolescent participants perceived their parents as more influential than their peer group, even during decision-making in the school canteen.…”
    Journal article
  9. 269

    CSQUiD: an index and non-probability framework for constrained skyline query processing over uncertain data by Lawal, Ma'aruf Mohammed, Ibrahim, Hamidah, Mohd Sani, Nor Fazlida, Yaakob, Razali, Alwan, Ali A.

    Published 2024
    “…Uncertainty of data, the degree to which data are inaccurate, imprecise, untrusted, and undetermined, is inherent in many contemporary database applications, and numerous research endeavours have been devoted to efficiently answer skyline queries over uncertain data. …”
    Get full text
    Article
  10. 270

    Optimizing material selection for brushed DC motor components using the VIKOR method: A comprehensive performance evaluation by Muhammad Nor Azril, Zulkafli, Mohd Azri Hizami, Rasid, Daing Mohamad Nafiz, Daing Idris

    Published 2025
    “…Results showed that the optimal material combination, consisting of a ferrite magnet, Al 356-T6 casing, chrome steel bearing, metal graphite brush, and nylon insulation, reduced winding temperature by 20 ℃ in a 5A copper losses test. …”
    Get full text
    Article
  11. 271
  12. 272

    Lean Six Sigma in healthcare: a systematic literature review on motivations and benefits by McDermott, Olivia, Antony, Jiju, Bhat, Shreeranga, Jayaraman, Raja, Rosa, Angelo, Marolla, Giuliano, Parida, Ratri

    Published 2022
    “…While Lean Six Sigma (LSS) has been applied extensively in healthcare organisations, there has been limited research on the trends of LSS application in healthcare in recent years. …”
    Get full text
    Article
  13. 273

    Enhancing motivation and addressing challenges in ESL writing using google docs: Insights from Malaysian tertiary students by Zuraina, Ali, Sharifatun Naim, Shahidan

    “…Results revealed high motivational benefits, with mean scores of 4.59 for improving writing skills through peer feedback and 4.19 for engaging in beneficial discussions. …”
    Get full text
    Get full text
    Book Chapter
  14. 274

    Treatment of acute sore throat in Malaysia: a consensus of multidisciplinary recommendations using modified Delphi methodology by Abdullah, Baharudin, Koh, Kar Chai, Mohamed, Mohazmi, Tan, Vincent Eng Soon, Mohammad, Nurashikin, Sekawi, Zamberi, Periyasamy, Petrick, Ramadas, Anitha, Duerden, Martin

    Published 2024
    “…Introduction: Using antibiotics in the treatment of acute sore throats has been linked with antimicrobial resistance (AMR) and needs to be addressed. …”
    Get full text
    Article
  15. 275

    It's not that dark, after all by Chia, Glenda

    Published 2023
    Get full text
    Final Year Project (FYP)
  16. 276

    Network architecture for large-scale CVE by Jiang, Bo Hong

    Published 2008
    “…A hybrid client-server with peer-to-peer audio/video communication network architecture is then proposed and implemented to address the issue of potential server bottleneck. …”
    Get full text
    Thesis
  17. 277
  18. 278
  19. 279
  20. 280

    Information hiding and copyrights by Araujo, Istteffanny Isloure

    Published 2024
    “…The study proposes a new scheme to improve Steganography called DSoBMP, together with guideline materials that have been published in four international peer-reviewed journals, including Springer and used as a stepping stone to collaborate in a worldwide book publication.…”
    Get full text
    Book Section