Showing 181 - 200 results of 1,326 for search '(((pina OR ping) OR shen) OR (((spans OR ((lingo OR link) OR pings)) OR ssspinga) OR sping))', query time: 0.08s Refine Results
  1. 181
  2. 182
  3. 183
  4. 184
  5. 185
  6. 186
  7. 187
  8. 188
  9. 189
  10. 190

    EFRAG-European Commission Sustainability Standards & ISSB Standard-Setting Process (2022–2024) by Carungu, Jonida, Dimes, Ruth, Molinari, Matteo

    Published 2025
    “…Contents: Links to Meeting Agendas-Key topics discussed in EFRAG SRB and ISSB meetings. …”
    Get full text
    Dataset
  11. 191

    Evaluation of sustainable supply chain risk: evidence from the Iranian food industry by Tavakoli Haji Abadi, Yasamin, Avakh Darestani, Soroush

    Published 2021
    “…The final weight of the main and sub-criteria was obtained using the F-BWM method via LINGO software. Risk management in the sustainable supply chain has the role of identifying, analyzing and providing solutions to control risks. …”
    Get full text
    Article
  12. 192

    A security enhanced timestamp-based password authentication scheme using smart cards by Pathan, Al-Sakib Khan, Hong, Choong Seon

    Published 2007
    “…We show various types of forgery attacks against Shen et al.’s timestamp-based password authentication scheme and improve their scheme to ensure robust security for the remote authentication process, keeping all the advantages of their scheme. …”
    Get full text
    Article
  13. 193

    Development of coated peanut separator and frying skillet machine by Yusof, M Sallehuddin, Fadilullah, M Zul Nadzmi, Hassan, Suhaimi, Maksud, M Idris, Yunos, Muhamad Zaini

    Published 2018
    “…The groundnut is sticking and become like a ping pong size ball and the time consuming to fry is longer. …”
    Get full text
    Article
  14. 194

    Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes by Waqar, Ali, Sang, Jun, Naeem, Hamad, Naeem, Rashid, Soomro, Ali Raza

    Published 2015
    “…As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. …”
    Get full text
    Get full text
    Proceeding Paper
  15. 195

    Pricing efficiency of the 3-month KLIBOR futures contracts: An empirical analysis by Razak, Marina Abdul, Bacha, Obiyathulla Ismath

    Published 2009
    “…This article also examines several issues related to pricing efficiency. The study spans the contract's entire 10-year history, June 1996 to June 2006. …”
    Get full text
    Article
  16. 196

    Legacy, sustainability and Olympism: crafting urban outcomes at London 2012 by Gold, Margaret, Gold, John Robert

    Published 2014
    “…Seen against that background, this paper opens with an historical overview that spans the period since the re-establishment of the Olympics in 1896. …”
    Get full text
    Article
  17. 197

    Fine recycled concrete aggregate as a material replacement in concrete production by Zaki, Zahir, Sheikh Khalid, Faisal, Shahidan, Shahiron

    Published 2020
    “…Construction and demolition waste is becoming a vital issue especially to the environmental aspect in many large cities in the world (Chen et al., 2002). Shen [1] describe C&D waste as the waste which generated from renovation, site clearing, demolition, construction, roadwork, land excavation and civil and building construction. …”
    Get full text
    Book Section
  18. 198
  19. 199

    An improved timestamp-based password authentication scheme with two-party verification using smart cards by Pathan, Al-Sakib Khan, Hong, Choong Seon

    Published 2007
    “…We present a detailed cryptanalysis of previously proposed Shen et. al’s scheme and an analysis of the improved scheme to show its improvements and efficiency.…”
    Get full text
    Proceeding Paper
  20. 200

    Some applications of generalised linear models by Scallan, Anthony

    Published 1990
    “…This technique is applied to standard link functions as well as to the family of composite link functions. …”
    Get full text
    Thesis