Showing 381 - 400 results of 1,591 for search '(((pinn OR (since OR (spine OR spike))) OR swing) OR (ssspinal OR (pin OR min)))', query time: 0.10s Refine Results
  1. 381

    Determination of carotenoid(s) composition in intact plant, callus and shoot cultures of Ruta angustifolia (L.) Pers. by Mohd. Zaifuddin, Fatimah Azzah, Mohd Hassan, Norazian, Othman, Rashidi

    Published 2011
    “…Antioxidants are well known to be associated with reduction in cancer incidence since they act against deteriorative effects of free radicals. …”
    Get full text
    Proceeding Paper
  2. 382

    Liquid LPG injection behavior in a spark ignition engine at idle state condition by Mustaffa, Norrizal, Fawzi, Mas, Amir Khalid, Amir Khalid, Norrizam Jaat, Norrizam Jaat, Tukiman, Mohd Mustaqim, Khairu Kamarudin, Khairu Kamarudin, Masrol, Shaiful Rizal, Esa, Mohd Faizal

    Published 2024
    “…The usage of LPG in spark ignition engine has been around since few years ago. The LPG fuel injection technology has evolved from gas injection into liquid injection. …”
    Get full text
    Conference or Workshop Item
  3. 383
  4. 384
  5. 385
  6. 386

    Olahan air sisa pusat penyembelihan ayam menggunakan elektrod keluli tahan karat dan aluminum melalui proses gabungan elektro-penggumpalan dan pengelompokan dan penggumpalan dengan... by Sakury, Khairudin

    Published 2017
    “…Nilai optimum ketumpatan arus elektrik, jarak antara elektrod, pH awalan, masa tindak balas dan masa enapan masing-masing adalah 25 A/m2, 5 cm, 5, 75 min dan 40 min. Manakala, peratusan penyingkiran yang diperolehi bagi COD, SS, NH3-N, warna dan kekeruhan masing-masing adalah 90.03%, 94.46%, 62.03%, 95.68% dan 94.96%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 387
  8. 388

    New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques by Islam, Md. Rafiqul, Naji, Ahmed Wathik, Zaidan , A. A., Zaidan , B. B.

    Published 2009
    “…Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology,it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from system managers in an organization that requires the high level of security. …”
    Get full text
    Article
  9. 389

    Unfinished architecture: urban continuity in the age of the complete by Temple, Nicholas

    Published 2015
    “…'How can anything ever present itself truly to us since its synthesis is never completed? How could I gain the experience of the world, as I would of an individual actuating his own existence, since none of the views or perceptions I have of it can exhaust it and the horizons remain forever open?' …”
    Get full text
    Book Section
  10. 390

    A scoping review of qualitative research on perceptions of one’s own alcohol use by Morris, Stephanie, Stewart, Duncan, Madden, Mary, McCambridge, Jim

    Published 2020
    “…Most studies were conducted since 2010, with the rate of publications increasing since 2014. …”
    Get full text
    Article
  11. 391

    The Radio Garden: private pleasures and public benefits by Lewis, Peter M., Mitchell, Caroliine

    Published 2021
    “…The launch in December 2016 of the Radio Garden, an output of the EU-funded Transnational Radio Encounters project, attracted a social media storm and hundreds of millions of page views. Since then, the number of visits has not significantly decreased. …”
    Get full text
    Article
  12. 392

    Error magnitude and directional accuracy for time series forecasting evaluation by Nor, Maria Elena

    Published 2014
    “…Evaluation of forecast accuracy is very much influenced by the choice of accurate measurement since it can produce different conclusion from the empirical results. …”
    Get full text
    Thesis
  13. 393

    Becoming 'NEET': an exploration of marginalised young people’s trajectories and experiences by Rajah, Heera

    Published 2019
    “…Significantly, all of the participants had been continuously NEET since the age of 18, with 12 of them NEET since the age of 16, and with none of them having been in employment since the age of 16. …”
    Get full text
    Thesis
  14. 394

    Performance characteristics on patch antenna with sar reduction using artificial magnetic conductor (amc) for wban applications by Omar Mumin, Abdul Rashid

    Published 2019
    “…Conventional patch antennas are adopted since they can be low weight, low profile and easy to integrate with the device. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 395

    War for the peace in Pakistan by Ali, Syed Masroor

    Published 2011
    “…Pakistan because of its geographical location became a front line state in the war against terror since the attack on the World Trade Centre on September 11, 2001. …”
    Get full text
    Get full text
    Proceeding Paper
  16. 396

    Factors influencing smoking behaviours among male adolescents in Kuantan district by Mohd Yassin, Rapeah, Yaacob, Munirah, Othman, Latifah, K, Faizah, S, Norsimah, M, Maryana, Saub, Roslan

    Published 2008
    “…Among smokers, 34.5% of them smoked since primary school and a majority (91.7%) smoked 10 or less cigarettes per day. …”
    Get full text
    Article
  17. 397
  18. 398

    Values in education policy-making with special reference to the FE Teachers' salaries structure and to the MacFarlane review of 16-19 provision by Cunningham, Kathryn Ann

    Published 1988
    “…The methodology is described at the outset, since it explains why the two major studies were selected as providing the best sources for the work. …”
    Get full text
    Thesis
  19. 399

    Building a family ontology to meet consistency criteria by Tan, Mee Ting

    Published 2015
    “…The proposed ontology also facilitates effective and efficient communication among all intended parties since shared vocabularies and standards are employed by the proposed ontology.…”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 400

    Modified anfis architecture with less computational complexities for classification problems by Talpur, Noureen

    Published 2018
    “…Since, ANFIS use fuzzy logic, the model accuracy is highly dependent on selecting the appropriate type of membership function. …”
    Get full text
    Get full text
    Get full text
    Thesis