Showing 261 - 280 results of 2,284 for search '(((spina OR pin) OR when) OR (((spans OR (pingk OR pings)) OR sssshinga) OR sping))', query time: 0.09s Refine Results
  1. 261

    Gender and the translation of audiovisual non-profit advertising by Corrius, Montse, De Marco, Marcella, Espasa, Eva

    Published 2016
    “…This paper aims to explore to what extent students enrolled on Translation and Advertising courses are gender aware, i.e. whether they perceive that the decisions they take when translating or creating nonprofit advertisements which present gender-related concerns may have an impact on the social perception of gender. …”
    Get full text
    Article
  2. 262

    Network security analytics on the cloud: public vs. private case by Vassilev, Vassil, Ouazzane, Karim, Sowinski-Mydlarz, Viktor, Maosa, Herbert, Nakarmi, Sabin, Hristev, Martin, Radu, Sorin

    Published 2023
    “…It has many of the advantages of the big public clouds but fundamentally differs from them when it comes to data management, operation interoperability, and costs. …”
    Get full text
    Conference or Workshop Item
  3. 263

    Partnering with AI for instrument development: possibilities and pitfalls by Beghetto, Ronald A., Ross, Wendy, Karwowski, Maciej, Glăveanu, Vlad

    Published 2025
    “…Recent advances in generative artificial intelligence (AI), specifically large language models (LLMs), provide new possibilities for researchers to partner with AI when developing and refining psychological instruments. …”
    Get full text
    Article
  4. 264

    Trust Evaluation Model in IoT Environment: A Comprehensive Survey by SOMYA ABDULKARIM ALHANDI, SOMYA ABDULKARIM ALHANDI, KAMALUDIN, HAZALILA, MOHAMMED ALDUAIS, NAYEF ABDULWAHAB

    Published 2023
    “…Trust is used to reduce the risk of insecurity when nodes are connected to the Internet. In an IoT environment, various trust models have been proposed for Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID). …”
    Get full text
    Article
  5. 265

    Mahathir as the Prime Minister: Peak of “Paternalistic Leadership” In Malaysia by Jaes, Lutfan, Razali, Nurul Aimi, Mohamad Suhaimy, Khairul Azman

    Published 2023
    “…The initial stance of this article was taken with reference to a previous study when Mahathir took office as the 4th Prime Minister of Malaysia. …”
    Get full text
    Article
  6. 266

    Trust Evaluation Model in IoT Environment: A Comprehensive Survey by ABDULKARIM ALHANDI, SOMYA, KAMALUDIN, HAZALILA, MOHAMMED ALDUAIS, NAYEF ABDULWAHAB

    Published 2023
    “…Trust is used to reduce the risk of insecurity when nodes are connected to the Internet. In an IoT environment, various trust models have been proposed for Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID). …”
    Get full text
    Article
  7. 267

    Trust Evaluation Model in IoT Environment: A Comprehensive Survey by ABDULKARIM ALHANDI, SOMYA, KAMALUDIN, HAZALILA, MOHAMMED ALDUAIS, NAYEF ABDULWAHAB

    Published 2023
    “…Trust is used to reduce the risk of insecurity when nodes are connected to the Internet. In an IoT environment, various trust models have been proposed for Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID). …”
    Get full text
    Article
  8. 268
  9. 269

    Mahathir as the Prime Minister: Peak of “Paternalistic Leadership” In Malaysia by Jaes, Lutfan, Razali, Nurul Aimi, Mohamad Suhaimy, Khairul Azman

    Published 2023
    “…The initial stance of this article was taken with reference to a previous study when Mahathir took office as the 4th Prime Minister of Malaysia. …”
    Get full text
    Article
  10. 270
  11. 271

    Battery charging and discharging control of a hybrid energy system using microcontroller by Pangaribowo, Triyanto, Utomo, Wahyu Mulyo, Abu Bakar, Afarulrazi, Khaerudini, Deni Shidqi

    Published 2020
    “…The control system that has been designed has the ability to choose the right DC source when the battery capacity is less than 80%. This system also has a good ability to choose a battery source when the battery reaches 100% capacity and the DC source has a voltage drop of more than 20%. …”
    Get full text
    Article
  12. 272
  13. 273
  14. 274
  15. 275
  16. 276
  17. 277
  18. 278

    Modification of natural rubber by graft copolymerisation of non-ionogenic hydrophilic monomers in latex by Dalimunthe, Rusdan

    Published 1989
    “…It was found that the grafting efficiency was much higher when using a dissociative initiator which does not attack NR directly (4-4'-azobis(4-cyanovaleric acid)) at ca. 63°C than when using a redox initiator (potassium persulphate-sodium metabisulphite) at 30°C. …”
    Get full text
    Thesis
  19. 279

    Experimental study of fracture energy for foamed concrete by Nasrullah, Alsad

    Published 2021
    “…Similar trends was observed for beams with V-notches when Bazant and CEB both overestimated by +13.33% and 24.48% but was again underestimated by JCIS at -29.16%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 280

    Effect of temperature and time to the antioxidant activity in Plecranthus amboinicus Lour by Abdul Rahim, Mohd S. Azman, Salihon, Jailani, Mohd Yusoff, Mashitah, Abu Bakar, Ibrahim, Damanik, Mohd Rizal Martua

    Published 2010
    “…Results: The antioxidant activity increased with the rise of temperature from 45-100[degrees]C but dropped when the extraction temperature was raised to 120[degrees]C. …”
    Get full text
    Article