-
261
-
262
Towards Ontology-based SQA Recommender for Agile Software Development
Published 2015Get full text
Article -
263
-
264
ECtHR extends application of Convention beyond Council of Europe borders
Published 2011Get full text
Article -
265
-
266
What should the European Court learn from the Inter-American Court on reparation?
Published 2012Get full text
Article -
267
An empirical assessment of business cycle asymmetries: evidence from Malaysia
Published 2010“…We find strong evidence of steep asymmetry but not deep sharp asymmetry for Malaysia which is in contrast to the findings of Khong and Lau (2007) and Eng and Wang (2008). These findings have important implications for econometric modeling and policy making.…”
Get full text
Article -
268
-
269
-
270
-
271
-
272
-
273
A comparative study between turbulence model RSM results of a dual inlet cyclone separator and k-epsilon RNG turbulence model
Published 2023“…The research evalute the results of Wang et al. 's (Chern Eng Process Intensification 158:108188, [2]) dual :intake cyclODe separator (known as 90° DI CyclODe) with a 7, 10, and 12 Jtm particle diameter and inlet velocity 15.5 m/s. …”
Get full text
Conference or Workshop Item -
274
Post traumatic cerebral oedema in severe head injury is related to intracranial pressure and cerebral perfusion pressure but not to cerebral compliance
Published 2009“…Hence post operative CT brain scans may be done to verify the ICP and CPP readings postoperatively. …”
Get full text
Article -
275
Qualitative analysis of potential adulterants of cheese lipids using Fourier Transform Infrared (FTIR) spectroscopy
Published 2015“…Spectra were collected by co-adding 16 scans from 4000 to 550 cm-1 wavelengths at 1 cm-1 resolution and a strong apodization was used. …”
Get full text
Get full text
Proceeding Paper -
276
A statistical approach for the prediction of cutting forces in end milling of medium carbon steel (S45C)
Published 2008Get full text
Proceeding Paper -
277
-
278
-
279
-
280
An asymmetric key-based security architecture for wireless sensor networks
Published 2008Get full text
Article