Showing 121 - 140 results of 12,913 for search '(((ching OR ((spike OR share) OR pin)) OR five) OR ((slink OR (line OR like)) OR ming))', query time: 0.14s Refine Results
  1. 121

    Culture of five species of Malaysia indigenous freshwater microalgae by Sallehudin, Nor Jannah, Mustapa, Mokhzanni, Mel , Maizirwan, Ahmad Raus, Raha

    Published 2016
    “…Five species of Malaysia indigenous chlorophycean microalgae were grown in laboratory culture under the comparable environmental condition and the population doubling time (td) as well as maximum growth rate (μmax) each was evaluated. …”
    Get full text
    Proceeding Paper
  2. 122

    Correlation of serum insulin like growth factor-I with retinopathy in Malaysian pregnant diabetics by Adzura, Salam, Muhaya, M, Zaleha, A. M., Sharifa Ezat, W.P

    Published 2011
    “…AIM: To study the association of serum insulin-like growth factor-I (IGF-I) with diabetic retinopathy. …”
    Get full text
    Article
  3. 123

    Development of patatin-like protein purification method from natural rubber industrial waste by Abdullah, Nurul Ain Harmiza, Yusof, Faridah, Mohd Nor, Zairossani

    Published 2009
    “…The serum extracted from skim latex was found to contain patatin-like protein which is homologous to patatin storage proteins in potato and tomato. …”
    Get full text
    Proceeding Paper
  4. 124

    Potts model with the competing interactions on a Cayley tree-like lattice: Quadrangle Chandelier by Ganikhodjaev, Nasir, Nawi, Mohamad Ashraf, Rodzhan, Mohd Hirzie

    Published 2012
    “…We study the phase of diagrams for the Potts model on a Cayley tree-like lattice, called Quadrangle Chandelier, with competing nearest-neighbour interactions J1,prolonged next nearest-neighbour interactions Jp and one-level quadrangle nearest-neighbour interactions Jo. …”
    Get full text
    Proceeding Paper
  5. 125

    The recombinant collagen-like protein as animal-based collagen substitution: a qualitative study by Duasa, Jarita, Mohamed Noor, Siti Fatimah, Mohd Thas Thaker, Mohamed Asmy, Rahman, Maya Puspa

    Published 2020
    “…The surge concern on the halal issues of collagen, which mainly comes from porcine or pork as well as bovine, leads to the development of the recombinant collagen-like protein as an alternative of animal-based collagen. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 126

    New modification of the hestenes-stiefel with strong wolfe line search by Japri, Nur Athira, Basri, Srimazzura, Mamat, Mustafa

    Published 2021
    “…In this paper, we proposed a new modification of the Hestenes-Stiefel conjugate gradient parameter that fulfils the condition of sufficient descent using a strong Wolfe-Powell line search. Besides, the conjugate gradient method with the proposed conjugate gradient also guarantees low computation of iteration and CPU time by comparing with other classical conjugate gradient parameters. …”
    Get full text
    Conference or Workshop Item
  7. 127
  8. 128
  9. 129

    Command based line following robot using RF technology by Bhatti, Anjun, Bhatti, Mohammad, Khowaja, Kamaran, Shah, Asadullah

    Published 2011
    “…This research paper demonstrates a prototype development of an Intelligent Command Based Line Follower Robot (LFR) using Radio Frequency (RF) Technology. …”
    Get full text
    Article
  10. 130
  11. 131

    An examination of some experimental methods of comparing intensities of spectrum lines by Smallwood, S. E. F.

    Published 1956
    “…Several methods of comparing intensities of spectrum lines are described, using photographic plates, photomultipliers and photo-resistive cells as the measuring instruments. …”
    Get full text
    Thesis
  12. 132
  13. 133
  14. 134

    Achieving security for images by LSB and MD5 by Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, O. Alhussainan, Sondos

    Published 2012
    “…This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. …”
    Get full text
    Article
  15. 135
  16. 136
  17. 137
  18. 138
  19. 139
  20. 140