Search alternatives:
els » gels (Expand Search), else (Expand Search), elms (Expand Search)
dplla » della (Expand Search), dalla (Expand Search), dpla (Expand Search), dplga (Expand Search), dpll (Expand Search)
mbella » bella (Expand Search), mbell (Expand Search), umbrella (Expand Search)
abella » abellan (Expand Search), gabella (Expand Search), sabella (Expand Search)
plla » pla (Expand Search), plga (Expand Search), pll (Expand Search)
els » gels (Expand Search), else (Expand Search), elms (Expand Search)
dplla » della (Expand Search), dalla (Expand Search), dpla (Expand Search), dplga (Expand Search), dpll (Expand Search)
mbella » bella (Expand Search), mbell (Expand Search), umbrella (Expand Search)
abella » abellan (Expand Search), gabella (Expand Search), sabella (Expand Search)
plla » pla (Expand Search), plga (Expand Search), pll (Expand Search)
-
601
-
602
Review of methods for assessing the carcinogenic hazards from coal-using energy technologies
Published 2005Get full text
Technical Report -
603
Gaps In Primary Care And Health System Performance In Six Latin American And Caribbean Countries
Published 2016“…We applied a validated survey on access, use, and satisfaction with health care services to nationally representative samples of the populations of Brazil, Colombia, El Salvador, Jamaica, Mexico, and Panama. Respondents reported considerable gaps in the ways in which primary care is organized, financed, and delivered. …”
Get full text
Get full text
Journal Article -
604
-
605
-
606
-
607
Bella's empowerment - why the twilight saga is not anti-feminist.
Published 2013“…Rowling and the Fifty Shades of Grey trilogy by E.L. James that have taken the contemporary literary scene by storm, no other novels can arguably match up to the success of Stephenie Meyer’s Twilight series. …”
Get full text
Final Year Project (FYP) -
608
-
609
Information encryption processing over wireless LAN
Published 2013“…The SecureCommunication2.0 and Mobile-Robot Tracking System include different types of encryption technologies such as Digital Encryption Standard (DES), Diffie-Hellman Public Key Algorithm, ElGamal algorithms, Message Digests and Digital Signatures. …”
Get full text
Final Year Project (FYP) -
610
-
611
-
612
Numerical simulation of a forced circulation solar water heating system
Published 2024Get full text
Article -
613
Machine learning, IoT and 5G technologies for breast cancer studies: A review
Published 2024Get full text
Article -
614
Putin-Biden summit : China's shadow looms large
Published 2021“…Russia and China, already close, appear to be getting even closer as Moscow seeks to forge a relationship with US President Biden.…”
Get full text
Commentary -
615
-
616
Blockchain and FL-based secure architecture for enhanced external Intrusion detection in smart farming
Published 2025“…Our architecture employs Ensemble Learning (EL) for the Local Model at the Ensemble Layer to train each Smart Land's data and offers privacy-prevented security. …”
Get full text
Article -
617
Targeting the youth : the potentials of the traditional Chinese medicine industry in Singapore.
Published 2008“…This research project focuses on the Traditional Chinese Medicine (TCM) industry in Singapore and its potential in getting the younger generation to be more interested in turning to TCM as an alternative form of healthcare method.…”
Get full text
Final Year Project (FYP) -
618
-
619
Primary type of trust required in the chinese workplace : a qualitative approach.
Published 2013“…Firstly, the results showed that Affective-based trust is the primary type of trust required to getting things done. Secondly, culturally unique attributes of Cognitive and Affective-based trust were identified. …”
Get full text
Final Year Project (FYP) -
620
Circularly polarized patch antennas for nano-satellite communication system
Published 2010“…Patch antennas (rectangular micro-strip antennas) are getting more popular as communication technology improves. …”
Get full text
Final Year Project (FYP)