Search alternatives:
hone » phone (Expand Search), bhone (Expand Search), one (Expand Search)
honey » phoney (Expand Search), bhoney (Expand Search), oney (Expand Search), money (Expand Search)
borne » bone (Expand Search), born (Expand Search)
hone » phone (Expand Search), bhone (Expand Search), one (Expand Search)
honey » phoney (Expand Search), bhoney (Expand Search), oney (Expand Search), money (Expand Search)
borne » bone (Expand Search), born (Expand Search)
-
161
Environmental contamination in a coronavirus disease 2019 (COVID-19) intensive care unit—what is the risk?
Published 2022Get full text
Journal Article -
162
Counterproductive effects of anti-CD38 and checkpoint inhibitor for the treatment of NK/T cell lymphoma
Published 2024Get full text
Journal Article -
163
Foot care behaviours and associated factors among patients with type 2 diabetes: a cross-sectional study
Published 2024Get full text
Journal Article -
164
-
165
The novel quinoline derivative SKA-346 as a KCa3.1 channel selective activator
Published 2025Get full text
Journal Article -
166
Profiling microbial communities in idiopathic granulomatous mastitis
Published 2023Get full text
Journal Article -
167
inPhocus: current state and challenges of phage research in Singapore
Published 2022Get full text
Journal Article -
168
CASTERS OF EVERVILLE /
Published 2024“…Wyn, a demon fairy with a heart of gold, is accused of a mysterious illness that spreads across the small town of Everville. Honey, his childhood friend, is determined to find a cure and put her life on the line in order to save her friend. …”
text -
169
SUPERHERO OF LOVE : HEAL YOUR BROKEN HEART & THEN GO SAVE THE WORLD /
Published 2019“…Readers will develop and hone their powers of Super Sight, Super Hearing, Super Humility, Super Self-Love, and Super Alignment to build their connection to their own hearts, the ultimate source of love in their lives…”
text -
170
EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs /
Published 2023“…This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. …”
Get full text
Get full text
software, multimedia -
171
Application of smartphone-based biophotonic instrumentation for glucose sensing using photometric method
Published 2024“…Glucose sensing is vital in health such as monitoring blood glucose levels in managing diabetes and food quality, for instance, adulterated honey detection. Current methods involve invasive, expensive equipment and highly trained personnel to carry out the test, which can limit the detection and application of glucose at on-site determination. …”
Get full text
Monograph -
172
Starting from scratch
Published 2016“…Based on research findings, the problem statement was identified, which helped hone the campaign’s strategy, tactics and goals. …”
Get full text
Final Year Project (FYP) -
173
Translational GTPase BipA is involved in the maturation of a large subunit of bacterial ribosome at suboptimal temperature
Published 2022“…Based on the growth curve, soft agar swimming assay, and sucrose gradient sedimentation analysis, mutation of the catalytic residue His78 rendered plasmid-borne bipA unable to complement its deletion phenotypes. …”
Get full text
Journal Article -
174
Machine learning based cybersecurity analytics
Published 2018“…Disgruntled employees, honey-trapped employees, “cash-for-data” greedy employees and similar categories of employees can deliberately transfer information out of the organization while many regular employees may not practice good cyber hygiene during transfer of information out of the organization without noticing associated risks. …”
Get full text
Final Year Project (FYP) -
175
The impact of natural climate variability on the global distribution of Aedes aegypti: a mathematical modelling study
Published 2024“…Some regions could experience vector-borne disease outbreaks earlier than expected under climate change alone. …”
Journal article -
176
Numerical simulation of static load test on barette piles
Published 2010“…During the construction of bored or barrette piles, there may be irregularities such as necking, bulging and honey combs along the pile. The main objective of this project is to study the effect of these geometry irregularities on the load distribution along the pile during pile load test. …”
Get full text
Final Year Project (FYP) -
177
Experimental investigation into load settlement characteristics of piled rafts in sand
Published 2011“…Studies by many notable researchers in the years to come suggest that the most effective combinations of piles and raft happens when all the initial loading can be borne with the raft’s bearing capacity alone. The role of the piles was solely to reduce the excessive settlement experienced by the plain raft.…”
Get full text
Final Year Project (FYP) -
178
15.280 Communication for Managers, Fall 2008
Published 2017“…Students may also enroll in 15.277 Special Seminar in Communication: Leadership and Personal Effectiveness Coaching. 15.280 is offered for 6 units and 15.277 provides an additional 3 units for a total of 9 units in Managerial Communication. 15.277 acts as a lab component to 15.280 and provides students additional opportunities to hone their communication skills through a variety of in-class exercises.…”
Get full text
Learning Object -
179
A multi-layer CNN-GRUSKIP model based on transformer for spatial: temporal traffic flow prediction
Published 2024“…The model comprises (1) the specialized CNN feature extraction, (2) the GRU-SKIP enhanced long-temporal module adept at capturing extended patterns, (3) a transformer module employing encoder-decoder and multi-attention mechanisms to hone prediction accuracy and trim model complexity, and (4) a bespoke prediction module. …”
Get full text
Article -
180
Exploring the dynamics of gene drive mosquitoes within wild populations using an agent-based simulation
Published 2024“…Gene drive technology is emerging as a potentially powerful tool in combating vector-borne diseases – notably malaria. This study introduces an agent-based model (ABM) focused on the deployment of genetically engineered mosquitoes with gene drive (GEM) in Príncipe Island, Republic of São Tomé and Príncipe, an island nation in the Gulf of Guinea, West Africa. …”
Conference item