Search alternatives:
elsa » elisa (Expand Search), else (Expand Search), lsa (Expand Search), gelsa (Expand Search), elsea (Expand Search), elmsa (Expand Search)
els » gels (Expand Search), else (Expand Search), elms (Expand Search)
mdella » della (Expand Search), idella (Expand Search), mbella (Expand Search), mddella (Expand Search), mdbella (Expand Search), mdplla (Expand Search)
mbplla » mbella (Expand Search)
ella » della (Expand Search), bella (Expand Search), plla (Expand Search)
elsa » elisa (Expand Search), else (Expand Search), lsa (Expand Search), gelsa (Expand Search), elsea (Expand Search), elmsa (Expand Search)
els » gels (Expand Search), else (Expand Search), elms (Expand Search)
mdella » della (Expand Search), idella (Expand Search), mbella (Expand Search), mddella (Expand Search), mdbella (Expand Search), mdplla (Expand Search)
mbplla » mbella (Expand Search)
ella » della (Expand Search), bella (Expand Search), plla (Expand Search)
-
121
Review of methods for assessing the carcinogenic hazards from coal-using energy technologies
Published 2005Get full text
Technical Report -
122
Gaps In Primary Care And Health System Performance In Six Latin American And Caribbean Countries
Published 2016“…We applied a validated survey on access, use, and satisfaction with health care services to nationally representative samples of the populations of Brazil, Colombia, El Salvador, Jamaica, Mexico, and Panama. Respondents reported considerable gaps in the ways in which primary care is organized, financed, and delivered. …”
Get full text
Get full text
Journal Article -
123
-
124
-
125
-
126
Bella's empowerment - why the twilight saga is not anti-feminist.
Published 2013“…Rowling and the Fifty Shades of Grey trilogy by E.L. James that have taken the contemporary literary scene by storm, no other novels can arguably match up to the success of Stephenie Meyer’s Twilight series. …”
Get full text
Final Year Project (FYP) -
127
-
128
Information encryption processing over wireless LAN
Published 2013“…The SecureCommunication2.0 and Mobile-Robot Tracking System include different types of encryption technologies such as Digital Encryption Standard (DES), Diffie-Hellman Public Key Algorithm, ElGamal algorithms, Message Digests and Digital Signatures. …”
Get full text
Final Year Project (FYP) -
129
-
130
-
131
Numerical simulation of a forced circulation solar water heating system
Published 2024Get full text
Article -
132
Machine learning, IoT and 5G technologies for breast cancer studies: A review
Published 2024Get full text
Article -
133
-
134
Blockchain and FL-based secure architecture for enhanced external Intrusion detection in smart farming
Published 2025“…Our architecture employs Ensemble Learning (EL) for the Local Model at the Ensemble Layer to train each Smart Land's data and offers privacy-prevented security. …”
Get full text
Article -
135
-
136
Cache refinement type for side-channel detection of cryptographic software
Published 2023“…We evaluate CaType in identifying side channel vulnerabilities in real-world crypto software, including RSA, ElGamal, and (EC)DSA from OpenSSL and Libgcrypt. …”
Get full text
Conference Paper -
137
Rethinking small-footprint counter-terrorism: moving from kinetic operations to security force assistance
Published 2015“…Drawing on the experiences of U.S. advisory efforts in El Salvador and the Philippines, this paper demonstrates that a counter-terrorism strategy centred on Security Force Assistance holds far more potential than the current enemy-centric policy. …”
Get full text
Thesis -
138
Characterizing the Life Cycle of Online News StoriesUsing Social Media Reactions
Published 2020Get full text
Presentation -
139
3–10 GHz self-biased resistive-feedback LNA with inductive source degeneration
Published 2013Get full text
Get full text
Journal Article -
140
Optically detected magnetic resonance spectroscopic analyses on the role of magnetic ions in colloidal nanocrystals
Published 2024Get full text
Journal Article