-
1
Optimal design and synthesis of rice supply chain
Published 2024Subjects: “…Rice trade—Research…”
Get full text
Thesis -
2
-
3
-
4
The human voice and the texture of experience
Published 2014“…This article explores the representation of the voice in texts about oral history over the years, arguing that too often it has been seen as a mechanism for retrieving otherwise inaccessible testimony rather than as a rich medium in its own right. …”
Get full text
Get full text
Article -
5
Communing with others: performing voices
Published 2024“…It seeks to understand what it means to ‘voice’ something, to give voice to something, to utter, to express, to vocalise, and to whom we are speaking or voicing for, to and with. …”
Get full text
Article -
6
-
7
Development of adsorbents from rice residues for mercury removal process
Published 2024Get full text
Thesis -
8
Proteome profiling and molecular dynamics simulation of Malaysian upland rice
Published 2023Get full text
Thesis -
9
Rice husk derived silica aerogel in unsaturated polyester composites
Published 2023Get full text
Thesis -
10
Sistem pengurusan pengairan untuk kemampanan tanaman padi di Sumatera Barat
Published 2023Subjects: “…Rice -- Irrigation…”
Get full text
Thesis -
11
-
12
-
13
-
14
Letter about Irish voice issue
Published 1990“…Circular letter dated 12 March 1990 from Irish in Britain Representation Group (IBRG) informing about the planning of the following issue of the Irish voice. Includes form.…”
Get full text
Correspondence -
15
Finding and funding voices: the London experience
Published 2008“…How are the voices of marginalised and disadvantaged communities to be heard in a large conurbation? …”
Get full text
Article -
16
One step bioconversion of lignin from rice husk to biovanillin by phanerochaete chrysosporium
Published 2023Subjects: Get full text
Thesis -
17
-
18
-
19
-
20
Securing voice communications using audio steganography
Published 2022“…In addition, the use of voice biometrics has been shown to have limitations and relatively poor performance when compared to other authentication methods. …”
Get full text
Article