-
321
Development of remote operability CNC milling
Published 2010“…Attachment consists of three main equipments; material indexing device, Sub clamp with pin and vise index…”
Get full text
Proceeding Paper -
322
The system architecture of E-braille by using the microcontroller and external controller unit
Published 2016“…This refreshable braille cell can refresh the character. The pin for each braille cell is controlled by using piezoelectric bimorph. …”
Get full text
Get full text
Article -
323
Pricing efficiency of the 3-month KLIBOR futures contracts: An empirical analysis
Published 2009“…The study spans the contract's entire 10-year history, June 1996 to June 2006. In line with findings in other markets, we find a pre-ponderance of overpricing. …”
Get full text
Article -
324
-
325
Evaluation of classifiers in a pressure and latency-based typing biometric system
Published 2011“…System authentication in present time relies on validation by some sort of a password or Personal Identification Number (PIN). However, if an intruder discovers this password or PIN, the user’s account can be easily compromised. …”
Get full text
Proceeding Paper -
326
An investigation of defect formation and growth in epoxy resin using light scattering methods
Published 1989“…The later has been attributed to failure occurring at the pin tip epoxy interface causing relaxation in the scattering volume. …”
Get full text
Thesis -
327
-
328
-
329
Multi-Mode Yagi Uda Patch Array Antenna With Non-Linear Inter-Parasitic Element Spacing
Published 2023“…Applying the inter-parasitic element spacing’s optimization and minimizing the switching circuitry using four RF PIN diodes on the parasitic elements have contributed to the gain achievement of more than 7 dBi.…”
Get full text
Article -
330
Histopathological effects of Eurycoma Longifolia jack extract (tongkat ali) on the prostate of rats
Published 2013“…However, although very widely used, it’s possible adverse effects are poorly studied .The objective of this study is to find out if there are any pathological changes that occur in the prostate of rats due to consumption of E.L. root extract. …”
Get full text
Article -
331
Opinion on the compatibility of the Anti-Counterfeiting Trade Agreement (ACTA) with the European Convention on Human Rights & the EU Charter of Fundamental Rights
Published 2011“…It follows a request to find out “if the final Version of ACTA and its foreseen legislative procedure is in line with the Treaties of the European Union and which legal possibilities there are for the European Parliament to challenge this in front of the European Court of Justice.” …”
Get full text
Monograph -
332
Granting employee stock options (ESOs), market reaction and financial performance
Published 2009“…Furthermore, stock prices do not seem to recover to pre-announcement levels during at least the subsequent 20 trading days or one calendar month. In line with US findings, operating performance deteriorates for ESO companies. …”
Get full text
Article -
333
Anticancer peptides derived from Supermeal worm, Zophobas morio
Published 2016“…Currently, the search for anticancer compounds has garner a lot of interest, especially in finding them from the natural sources. In this study, compounds, supposedly peptides, extracted from cheap, easily maintained Supermeal worm (Zophobas morio) using two types of acidified organic solvent, ethanol and isopropanol, were shown to inhibit the growth of MCF-7, a breast cancer cell line. …”
Get full text
Proceeding Paper -
334
Development of coated peanut separator and frying skillet machine
Published 2018“…The groundnut is sticking and become like a ping pong size ball and the time consuming to fry is longer. …”
Get full text
Article -
335
A concept of shear wall for the design of high-rise buildings construction
Published 2011“…In order to find the stiffness, the simple systems models can provide reasonable results. …”
Get full text
Book Chapter -
336
Comparison of Basic Iterative Methods Used to Solve of Heat and Fluid Flow Problems
Published 2023“…The Jacobi method, the point Gauss-Seidel method, the successive over-relaxation method (SOR), the line Gauss method (TDMA), the ADI method and Strongly Implicit (SIP) method are among the iterative approaches investigated, which are then compared to find the most optimal method. …”
Get full text
Article -
337
Comparison of Basic Iterative Methods Used to Solve of Heat and Fluid Flow Problems
Published 2023“…The Jacobi method, the point Gauss-Seidel method, the successive over-relaxation method (SOR), the line Gauss method (TDMA), the ADI method and Strongly Implicit (SIP) method are among the iterative approaches investigated, which are then compared to find the most optimal method. …”
Get full text
Article -
338
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
Published 2015“…As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. …”
Get full text
Get full text
Proceeding Paper -
339
The tribological behaviour of Fe-C-Al cast iron – effect of temperature
Published 2013“…The wear and friction tests were conducted using universal pin-on-disk machine at 25 0C, 100 0C, 200 0C and 300 0C temperature. …”
Get full text
Article -
340
Wear characteristics of Fe-C-Si and Fe-C-Al cast irons
Published 2011“…In the present study, wear behavior of the Fe-C-Si and Fe-C-Al cast irons were investigated using a pin-on-disk type apparatus at room temperature. …”
Get full text
Article