Showing 221 - 240 results of 5,045 for search '(((pinn OR ming) OR find) OR (((ain OR anna) OR (zheng OR lingo)) OR ling))', query time: 0.10s Refine Results
  1. 221
  2. 222
  3. 223
  4. 224
  5. 225
  6. 226

    SMART: a subspace based malicious peers detection algorithm for P2P systems by Wei, Xianglin, Fan, Jianhua, Chen, Ming, Ahmed, Tarem, Pathan, Al-Sakib Khan

    Published 2013
    “…SMART first reconstructs the original reputation matrix based on subspace method, and then finds malicious peers out based on Shewhart control chart. …”
    Get full text
    Article
  7. 227

    An Improvement in Boundary Treatment of Solid Boundary Using ISPH Approach by Idris, Nur’Ain, Mitsuteru Asai, Mitsuteru Asai, Mohd Noh, Hamidun

    Published 2023
    “…The outcome of the numerical modelling simulation was then contrasted with the findings of the theoretical and experimental studies. …”
    Get full text
    Article
  8. 228

    An Improvement in Boundary Treatment of Solid Boundary Using ISPH Approach by Idris, Nur’Ain, Mitsuteru Asai, Mitsuteru Asai, Mohd Noh, Hamidun

    Published 2023
    “…The outcome of the numerical modelling simulation was then contrasted with the findings of the theoretical and experimental studies. …”
    Get full text
    Article
  9. 229
  10. 230
  11. 231
  12. 232

    Preparing health care providers for disaster response-experience from selected countries by Ahayalimudin, Nurul'Ain, W.P, Sharifa Ezat, A, Siti Nurul Akma

    Published 2012
    “…Methodology: English language articles on disaster response among health care providers were reviewed, focusing on United States of America and Japan, and literature search via electronic databases which were identified using keywords. Findings: Japan is known as well-prepared country in the world in terms of disaster management. …”
    Get full text
    Article
  13. 233
  14. 234
  15. 235
  16. 236
  17. 237
  18. 238
  19. 239
  20. 240