Showing 461 - 480 results of 1,943 for search '(((hone OR ((pdone OR prone) OR phone)) OR honey) OR (hon OR (boon OR book)))'s', query time: 0.18s Refine Results
  1. 461
  2. 462
  3. 463
  4. 464

    GROUND IMPROVEMENT AND STRUCTURAL DESIGN APPLICATIONS IN GEOTECHNICAL ENGINEERING / by Siti Norafida Jusoh, 1983-, editor 603312, Nor Zurairahetty Mohd. Yunus, editor 626642, Siti Norafida Jusoh, 1983-, contributor 603312, Nor Zurairahetty Mohd. Yunus, contributor 626642, Abideen Adekunle Ganiyu, 1978-, contributor 603119, Afikah Rahim, contributor 654180, Ahmad Safuan A. Rashid, contributor 616987, Aida Batrisyia Jasni, 1993-, contributor 606218, Aminaton Marto, contributor 190407, Azman Kassim, contributor 620781, Chan, Jia Ying, 1987-, contributor 506866, Dayang Zulaika Abang Hasbollah, 1988-, contributor 615329, Dayangku Salma Awang Ismail, 1982-, contributor 636878, Fauziah Kasim, contributor 241621, Hisham Mohamad, contributor 384495, Hossein Moayedi, contributor 609147, Kamarudin Ahmad, contributor 377360, Khairun Nissa Mat Said, 1988-, contributor 507079, Lee Pier Tien, contributor, Lim, Boon Lin, 1988-, contributor 593021, Mark Ruben Anak Upom, 1993-, contributor 610463, Mohammed Ridzuan Jahidin, 1970-, contributor 285467, Mohd. Hanim Osman, contributor 603120, Mohd. Nur Asmawisham Alel, 1975-, contributor 646246, Muhammad Irfan Shahrin, 1991-, contributor 568606, Nazri Ali, contributor 182241, Norazirah Abdul Aziz, contributor, Ramli Nazir, contributor 611019, Rini Asnida Abdullah, contributor 236435, Sitti Asmah Hassan, contributor 447793, Tan Yean Chin, contributor 200382, Yamusa Bello Yamusa, 1982-, contributor 624102, Yong, Chin Yung, 1988-, contributor 547872

    Published 2024
    text
  5. 465

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…It's a crucial skill for SOC analysts, enabling them to analyze different threats and identify security incident origins. This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. …”
    Get full text
    Get full text
    software, multimedia
  6. 466

    SUPERHERO OF LOVE : HEAL YOUR BROKEN HEART & THEN GO SAVE THE WORLD / by Fonger, Bridget, 1962-, author 655765

    Published 2019
    “…Readers will develop and hone their powers of Super Sight, Super Hearing, Super Humility, Super Self-Love, and Super Alignment to build their connection to their own hearts, the ultimate source of love in their lives…”
    text
  7. 467

    Smartphone application in determining the reflection point for line-of-sight wireless systems by Chua, Han Jie.

    Published 2012
    “…With the increasing popularity of smart phone usage, it is advantages to develop smartphone applications that can aids and arouse interest of the students studying wireless communication module.In a wireless system where multi path propagation occurs, the reflection point in a Line of Sight System is of great importance and great interest as the position of the reflection point willl affects the quality of the signal received.In this project, a smart phone application using the Android 2.2 OS was developed to correlate the GPS reading of the user location, to retrieve user various values selection.The program used two reflection point calculation methods namely the Bisection Algorithm method and Solving the Cubic Equation method to calculate thereflection point position.The reflection point will be potrayed onto a graphical map upon calculation.…”
    Get full text
    Final Year Project (FYP)
  8. 468

    Development of applications for mobile devices I by Panganiban, Nicole Dale

    Published 2016
    “…However, as the technology progresses an easier and more convenient way was developed, medical appointment booking was readily available online. Although such service was already available online, as the technology continues to progress developers looked into the ease of use of portable digital devices such as mobile phones. …”
    Get full text
    Final Year Project (FYP)
  9. 469

    Activity recognition from inertial sensors on a smartphone by Chee, Kok Hao

    Published 2015
    “…In this project, unobtrusive finding of a person’s activities is implemented through a smart phone. Decision of using android-based smart phone is chosen to monitor and derive recognition over the activities performed. …”
    Get full text
    Final Year Project (FYP)
  10. 470

    AudiCeive : mobile application to recognize unique audio frequencies using acoustic fingerprinting by Saraswathi Karuppiah

    Published 2017
    “…How many of them would be interested to know more about those places at such a young age, let alone finish reading the book which does not earn their attention? However if we place a phone in their hand together with a movie clip playing and let them see the phone returning a few details about the place they just saw on screen, things take a different angle. …”
    Get full text
    Final Year Project (FYP)
  11. 471

    CASTERS OF EVERVILLE / by Yap, Cherilyn, author 655829, Ikram Wazir, editor 655732

    Published 2024
    “…Wyn, a demon fairy with a heart of gold, is accused of a mysterious illness that spreads across the small town of Everville. Honey, his childhood friend, is determined to find a cure and put her life on the line in order to save her friend. …”
    text
  12. 472

    What is formal verification without specifications? A survey on mining LTL specifications by Neider, D, Roy, R

    Published 2024
    “…However, formulating specifications remains a manual task that is notoriously challenging and error-prone. To address this bottleneck in formal verification, recent research has thus focussed on automatically generating specifications for formal verification from examples of (desired and undesired) system behavior. …”
    Book section
  13. 473

    Sold To Be A Wife : ONLY A DETERMINED FOSTER CARER CAN STOP A TERRIFIED GIRL FROM BECOMING A CHILD BRIDE / by Hartley, Maggie, author 656233

    Published 2018
    “…But a few weeks later, Maggie is woken up in the middle of the night by a phone call from a terrified Shazia, who has managed to escape the family home through a window. …”
    text
  14. 474

    Open source security issues of the Android operating system by Hong, Hsiang Ted.

    Published 2011
    “…Smart phone is a very common electronic device today compared to ten years ago. …”
    Get full text
    Final Year Project (FYP)
  15. 475

    Taking eService-Learning to the Next Level / by Strait, Jean R., 1965-, editor 656157, Shumer, Robert D., 1947-, editor 656160, Nordyke, Katherine J., editor 656159, IAP Books (Online service) 656161

    Published 2023
    “…The chapters in this book provide an excellent story of the growth of e-learning and eService-learning over the past many years. …”
    Get full text
    software, multimedia
  16. 476

    Hand in hand : designing active learning for children. by Lio, Joanne Shi Qi.

    Published 2012
    “…The project celebrates the benefits of art making for both parent and child through a range of collaborative art activities in an activity book, and also promotional items. They are designed to encourage hands-on experiences between parent and child.…”
    Get full text
    Final Year Project (FYP)
  17. 477

    Portable mobile surveillance and detection by Tan, Weishen

    Published 2016
    “…With the increasing number of people using smart phone, old smart phone can be use as a surveillance camera. …”
    Get full text
    Final Year Project (FYP)
  18. 478

    Application of smartphone-based biophotonic instrumentation for glucose sensing using photometric method by Aziz, Nur Anis Huda

    Published 2024
    “…Glucose sensing is vital in health such as monitoring blood glucose levels in managing diabetes and food quality, for instance, adulterated honey detection. Current methods involve invasive, expensive equipment and highly trained personnel to carry out the test, which can limit the detection and application of glucose at on-site determination. …”
    Get full text
    Monograph
  19. 479

    A review of emotion sensing: categorization models and algorithms by Wang, Zhaoxia, Ho, Seng-Beng, Cambria, Erik

    Published 2022
    “…Sentiment analysis consists in the identification of the sentiment polarity associated with a target object, such as a book, a movie or a phone. Sentiments reflect feelings and attitudes, while emotions provide a finer characterization of the sentiments involved. …”
    Get full text
    Journal Article
  20. 480