Showing 61 - 80 results of 392 for search '(((hone OR phone) OR bhone) OR borne)'s', query time: 0.11s Refine Results
  1. 61

    In-situ chemical attenuation of pharmaceutically active compounds using CaO₂: influencing factors, mechanistic modeling, and cooperative inactivation of water-borne microbial pathogens by Zheng, Ming, Gao, Bing, Zhang, Jie, El-Din, Mohamed Gamal, Snyder, Shane Allen, Wu, Minghong, Tang, Liang

    Published 2022
    “…Water polluted by pharmaceutically active compounds (PhACs) and water-borne pathogens urgently need to develop eco-friendly and advanced water treatment techniques. …”
    Get full text
    Journal Article
  2. 62

    Mosquito-borne diseases in urban East African Community region: a scoping review of urban typology research and mosquito genera overlap, 2000-2024 by Joseph, NK, Mumo, E, Morlighem, C, Macharia, PM, Snow, RW, Linard, C

    Published 2024
    “…Background: Growing concerns about mosquito-borne diseases (MBDs) in urban settings have prompted renewed urgency for collaborative and active mosquito surveillance programs. …”
    Journal article
  3. 63
  4. 64
  5. 65
  6. 66
  7. 67
  8. 68
  9. 69
  10. 70
  11. 71
  12. 72

    Healthcare - Solutions for a Better World ? by Datta, Shoumen

    Published 2024
    Subjects: “…Healthcare, Digital Health, Vaccines, Immunization, Remote Monitoring, SmartPhones in Diagnostics, Molecular Diagnostics, Vital Sign Monitoring, Neurodegenerative Diseases, NeuroCognitive Disorders, Data Analytics, Predictive Analytics…”
    Get full text
    Presentation
  13. 73
  14. 74
  15. 75
  16. 76

    SUPERHERO OF LOVE : HEAL YOUR BROKEN HEART & THEN GO SAVE THE WORLD / by Fonger, Bridget, 1962-, author 655765

    Published 2019
    “…Readers will develop and hone their powers of Super Sight, Super Hearing, Super Humility, Super Self-Love, and Super Alignment to build their connection to their own hearts, the ultimate source of love in their lives…”
    text
  17. 77

    Open source security issues of the Android operating system by Hong, Hsiang Ted.

    Published 2011
    “…Smart phone is a very common electronic device today compared to ten years ago. …”
    Get full text
    Final Year Project (FYP)
  18. 78

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. …”
    Get full text
    Get full text
    software, multimedia
  19. 79

    Portable mobile surveillance and detection by Tan, Weishen

    Published 2016
    “…With the increasing number of people using smart phone, old smart phone can be use as a surveillance camera. …”
    Get full text
    Final Year Project (FYP)
  20. 80

    Development of applications for mobile devices I by Panganiban, Nicole Dale

    Published 2016
    “…Although such service was already available online, as the technology continues to progress developers looked into the ease of use of portable digital devices such as mobile phones. Smart phones became a necessity to most people. …”
    Get full text
    Final Year Project (FYP)