Showing 1 - 20 results of 222 for search '(((pina OR ping) OR shen) OR ((((spans OR span) OR (pink OR pings)) OR sssspinga) OR sping))', query time: 0.09s Refine Results
  1. 1

    Span load modification via differential spoiler setting by Elsayed, Omer Ali, Asrar, Waqar, Omar, Ashraf Ali

    Published 2010
    “…Topology of the wake vortices downstream of the configuration will largely depends on the span wise load distribution. In order to measure the span load distribution on the wing, a wake integration technique based on the control volume approach was used. …”
    Get full text
    Proceeding Paper
  2. 2

    Minimal spanning tree for 100 companies in Bursa Malaysia by Bahaludin, Hafizah, Abdullah, Mimi Hafizah, Mat Salleh, Supian

    Published 2015
    “…This paper investigates the stock market network among the stocks traded in Bursa Malaysia by using minimal spanning tree (MST) techniques. The daily closing prices from 2011 until 2013 of 100 companies based on market capitalization are chosen to construct the network. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Experience, skill and competence: boundary spanning capabilities for leadership and management of transnational education by Messenger, Hazel, Bloisi, Wendy

    Published 2020
    “…Keywords: activity theory; boundary spanning distributed leadership; partnerships; professional learning community; transnational education…”
    Get full text
    Get full text
    Book Section
  6. 6

    A hybrid technique using minimal spanning tree and analytic hierarchical process to prioritize functional requirements for parallel software development by Muhammad Yaseen, Muhammad Yaseen, Mustapha, Aida, Shah, Muhammad Arif, Ibrahim, Noraini

    Published 2023
    “…This research proposes a hybrid prioritization technique of minimal spanning trees (MST) and AHP called the spanning analytic hierarchical process (SAHP) for FRs prioritization by exploiting MST capability to prioritize large size software FRs with smaller pairwise comparisons but with more consistent results. …”
    Get full text
    Article
  7. 7

    A hybrid technique using minimal spanning tree and analytic hierarchical process to prioritize functional requirements for parallel software development by Muhammad Yaseen, Muhammad Yaseen, Mustapha, Aida, Shah, Muhammad Arif, Ibrahim, Noraini

    Published 2023
    “…This research proposes a hybrid prioritization technique of minimal spanning trees (MST) and AHP called the spanning analytic hierarchical process (SAHP) for FRs prioritization by exploiting MST capability to prioritize large size software FRs with smaller pairwise comparisons but with more consistent results. …”
    Get full text
    Article
  8. 8

    A hybrid technique using minimal spanning tree and analytic hierarchical process to prioritize functional requirements for parallel software development by Muhammad Yaseen, Muhammad Yaseen, Mustapha, Aida, Muhammad Arif Shah, Muhammad Arif Shah, Ibrahim, Noraini

    Published 2023
    “…This research proposes a hybrid prioritization technique of minimal spanning trees (MST) and AHP called the spanning analytic hierarchical process (SAHP) for FRs prioritization by exploiting MST capability to prioritize large size software FRs with smaller pairwise comparisons but with more consistent results. …”
    Get full text
    Article
  9. 9

    Effect of chromium (cr) particle size and span-20 surfactant on Aisi d2 hardened steel using electrical discharge machining by Jamil Hosni, Nor Ain

    Published 2020
    “…This research emphasizes the machining of AISI D2 hardened steel with EDM through adding both of micro and nano chromium powder mixed and span-20 surfactant using copper tool electrode. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Pembangunan kerangka strategi dalam penyelesaian harta tanah Al-Mafqud di Malaysia by Sulaiman, Muhammad Azwan

    Published 2017
    Subjects: “…HD50-50.5 Delegation of authority. Decentralization. Span of control…”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Attacks on Shen et. al.’s remote user authentication scheme and defense* by Pathan, Al-Sakib Khan, Hong, Choong Seon

    Published 2006
    “…We show various types of forgery attacks against Shen et. al.’s timestamp-based scheme and improve their scheme to ensure robust security for the remote authentication process keeping almost all the advantages that were present in their scheme. …”
    Get full text
    Proceeding Paper
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20