Showing 421 - 440 results of 3,012 for search '(((ching OR ((spike OR share) OR pin)) OR five) OR ((slink OR (line OR like)) OR ming))', query time: 0.10s Refine Results
  1. 421

    Iraq’s democratic dilemmas: from entrenched dictatorship to fragile democracy by Abdulla, Namo

    Published 2010
    “…Saddam and his former like-minded people created a culture capable of producing as many dictators as it wants. …”
    Get full text
    Article
  2. 422

    The pecking order by Scarso, Jacek Ludwig

    Published 2019
    “…Drawing on surveillance techniques such as CCTV cameras and internet data monitoring, bird-like characters watch over Tate Modern in a performative/VR intervention. …”
    Show/Exhibition
  3. 423

    Compact and broadband 4×4 SIW Butler matrix with phase and magnitude error reduction by Karamzadeh, Saeid, Rafii, Vahid, Kartal, Mesut, Virdee, Bal Singh

    Published 2015
    “…This is achieved by reducing the size of Butler matrix and avoiding the use of a line length which causes a phase shift.…”
    Get full text
    Article
  4. 424

    Fuzzy logic application to searchable cryptography by Kazemian, Hassan, Ma, Yang

    Published 2020
    “…Besides, some PEKS schemes are not secure mainly because they are vulnerable to Off-line Keyword Guessing Attack (OKGA). This research paper incorporates with Mamdani Fuzzy Inference System to PEKS for supporting Fuzzy Keyword Search. …”
    Get full text
    Conference or Workshop Item
  5. 425

    Beyond individual flow: distributed flow in ice hockey, its antecedents and consequences to performance by Reidelberger, Melissa

    Published 2023
    “…Mental toughness had both a direct and indirect effect on flow, which increased performance. This finding was in line with previous research, confirming the integrity of the data and allowing for the new individual subscales to be analysed in the same fashion. …”
    Get full text
    Thesis
  6. 426
  7. 427

    “Remettons nous-y”: the challenges of online language upskilling by Sadoux, Marion

    Published 2011
    “…The course (60 hours in total) consists of - 4 days of face to face tuition, 20 hours of online asynchronous learning and 20 hours of online synchronous learning over a five month long period. Its curriculum was based on the up skilling specifications created by CILT.…”
    Get full text
    Article
  8. 428

    "Not an encounter group": democracy and women's committees by Stokes, Wendy

    Published 1996
    “…The following thesis describes the membership, goals and activities of five women's committees which were studied between 1992 and 1995. …”
    Get full text
    Thesis
  9. 429

    Low magnetic field exposure alters prostate cancer cell properties by Lange, Sigrun, Inal, Jameel, Kraev, Igor, Dart, Dafydd Alwyn, Uysal-Onganer, Pinar

    Published 2024
    “…This study investigated the effects of LMF exposure (20 nT) by magnetic shielding on the prostate cancer cell line PC3 compared to the prostate epithelial cell line PNT2 under short-term (4 h) conditions. …”
    Get full text
    Article
  10. 430

    The Hairy Marys by O'Brien, Joanne, London Irish Women's Centre, LIWC

    Published 1985
    “…Black and white photograph of five women dancing in a circle in a sports hall. …”
    Get full text
    Photograph
  11. 431

    Poems: Childhood, Nature, Villanelle, Come to me out of the moonlight, A dream by Patton, Winifred

    “…Seven-page manuscript of five poems by Winifred Patton: Childhood, Nature, Villanelle, Come to me out of the moonlight, and A dream.…”
    Get full text
    Get full text
    Ephemera
  12. 432

    Recording, reporting, and charge rates for rape in England and Wales by Lovett, Jo, Kelly, Liz, Vera-Gray, Fiona, Hales, Gavin, Uzelac, Gordana, Buil-Gil, David, Myhill, Andy

    Published 2023
    “…Briefing 2 of Pillar Five for Operation Soteria Bluestone. This briefing shares the results of research investigating the real scale and nature of rape reporting to and recording by the police, as well as the charge rate, in England and Wales. …”
    Get full text
    Monograph
  13. 433

    Novel approaches to applied cybersecurity in privacy, encryption, security systems, web credentials, and education by Ruiz, Rodrigo de Souza

    Published 2021
    “…The needs of the government, industry, customers, and real-life problems in five categories: Privacy, Encryption, Web Credentials, Security Systems and Education, were the research stimuli. …”
    Get full text
    Thesis
  14. 434

    Using Passive Strategies to prevent overheating and promote resilient buildings by Brotas, Luisa, Nicol, Fergus

    Published 2016
    “…This paper assesses the likelihood of a model dwelling in London overheating in line with climatic predictions for the year 2030, 2050 and 2080. …”
    Get full text
    Conference or Workshop Item
  15. 435

    Multi-Way and Poly-Phase Wideband Differential Phase Shifter Based on Metamaterial Technology by Hamidia, A, Honarvar, M. Amin, Virdee, Bal Singh

    Published 2019
    “…This paper presents multi-way and poly-phase differential phase shifter (DPS) based on metamaterial technology to realize delay lines of equal length. The proposed phase shifter provides the required phase shift relative to the reference line over a wide bandwidth. …”
    Get full text
    Article
  16. 436

    Visual inference of arm movement is constrained by motor representations by Saunier, Ghislain, Paillard, Aurore, Vargas, Claudia D., Pozzo, Thierry

    Published 2015
    “…Our study highlighted a direction effect: endpoint prediction accuracy was better to infer the final position of horizontal motion directed toward the median line of human body. This finding suggests that the spatial prediction of endpoint is mapped onto implicit biomechanical knowledge such as joint limitation. …”
    Get full text
    Article
  17. 437

    Fraudulent mediums and miracle-mongers: illusion, concealment and revelation in the works of Crivelli, Greenberg and Houdini by David, Karen

    Published 2024
    “…This article aims to raise questions and comparisons between illusions found in pictorial language, magical apparatus and parafictions, illustrating the fine line between illusion and material, and concealment and revelation.…”
    Article
  18. 438

    Bandwidth extension of planar antennas using embedded slits for reliable multiband RF communications by Alibakhshikenari, Mohammad, Naser-Moghadasi, Mohammad, Sadeghzadeh, Ramazan Ali, Virdee, Bal Singh, Limiti, Ernesto

    Published 2016
    “…Characteristics of the antenna include an impedance bandwidth of 5.25 GHz (800 MHz–6.05 GHz) for VSWR<2 corresponding to a fractional bandwidth of 153.28%, peak gain of 5.35 dBi, radiation efficiency of 84.12% at 4.45 GHz, and low cross-polarization. …”
    Get full text
    Article
  19. 439
  20. 440

    Multiband antenna for portable device applications by Honarvar, M. Amin, Hamidi, Naeemehsadat, Virdee, Bal Singh

    Published 2015
    “…Measurements confirm the antenna can simultaneously operate over the frequency bands of: DCS (1.71–1.85 GHz), PCS (1.85–1.99 GHz), UMTS (1.92–2.17 GHz), Wibro (2.3–2.39 GHz), WLAN+ Bluetooth (2.4–2.48 MHz), WIMAX (2.5–2.69 GHz), WIMAX (3.3–3.5 GHz), HIPERLAN2 (5.15–5.35/5.47–5.725 GHz), and WLAN (5.15–5.35/5.725–5.825 GHz). …”
    Get full text
    Article