Showing 761 - 780 results of 2,109 for search '(((spinae OR spine) OR (spie OR line)) OR ((pina OR spent) OR ping))', query time: 0.19s Refine Results
  1. 761

    Empowering the employability of people with disability (PWD) through a skills intervention program by Omar, Muhd Khaizer, Mohd Puad, Mohd Hazwan, Yaakub, Mohamad, Muslim, Marlinah, Gui, Qing

    Published 2024
    “…In the program, the group of PWDs spent three days with employability skill trainers and certified image consultants. …”
    Get full text
    Article
  2. 762

    Energy expenditure in relation to activity of lesser mouse deer (Tragulus javanicus) by ., Darlis, Abdullah, N., Liang, J.B, Purwanto, B.

    Published 2001
    “…The time for each activity of male and female mouse deer kept in RC and OD was similar. The average time spent in RC and OD for both male and female, respectively, for sitting (956 and 896 min/day) was significantly (P < 0.01) longer than standing (463 and 520 min/day) and eating (21 and 24 min/day). …”
    Get full text
    Article
  3. 763

    Loan Moratorium Announcement and Stock Market Reactions: An Event Study Analysis (S/O 14829) by Che Johari, Edie Erman

    Published 2022
    “…Despite a huge amount fund has been spent to support borrowers, its resultant impact on banks remains unanswered. …”
    Get full text
    Monograph
  4. 764
  5. 765

    The Tampines Cybertimes : from conception to infancy by Goh, Adeline I Ling, Kwek, Amelia Woon, Yang, Jonathan Sun Cheung, Yeo, Jeffrey Wee Teck

    Published 2009
    “…The Tampines CyberTimes started when four students from the School of Communication Studies had a hunch that an on-line community newspaper would pave the way for the future development of journalism in Singapore. …”
    Get full text
    Final Year Project (FYP)
  6. 766

    Study of arbitrary waveform generation for software defined radio by Luo, Jia Yu.

    Published 2010
    “…It can provide excellent non line of sight (NLOS) coverage while many technologies currently can only provide line of sight coverage. …”
    Get full text
    Final Year Project (FYP)
  7. 767

    Embedded evolvable fuzzy hardware systems for cell flow scheduling by Li, Ju Hui

    Published 2008
    “…The three major open issues are on-line adaptation, scalability and evolution termination. …”
    Get full text
    Thesis
  8. 768

    Residual stress testing of weld specimens by Tan, Kailun

    Published 2017
    “…Various NDT tests were conducted both on and along the weld line, as well as corresponding areas away from the weld line and the results were compared. …”
    Get full text
    Final Year Project (FYP)
  9. 769
  10. 770
  11. 771
  12. 772
  13. 773
  14. 774

    Coevolving Cybersecurity Adversaries for Industrial Control Systems in Failure-Prone Environments by Wicks, Kathryn

    Published 2024
    “…In the sub-area that this thesis focuses on, power microgrids, such disturbances can come in the form of line-line faults, line-ground faults, lack of generation capacity to meet demand, and unintentional islanding, among many others. …”
    Get full text
    Thesis
  15. 775

    Sessile droplet evaporation on patterned surfaces by Ng, Aaron Chin Liang

    Published 2023
    “…For the patterned substrate, a 0º and 45º line of sights are used. Both offer different properties such as hydrophobicity. …”
    Get full text
    Final Year Project (FYP)
  16. 776

    Computational and experimental study of a platinum thin-film based oil condition and contamination sensor by Sridhar, V, Chana, KS, Singh, D

    Published 2017
    “…The sensor is able to detect any form of contamination in oil and can be used for both off-line and on-line condition monitoring. The sensor is found to be quite sensitive and can detect extremely small concentrations of contaminants of the order 0.01 % by volume. …”
    Conference item
  17. 777
  18. 778
  19. 779

    Security enhancement of the communication-efficient AUTHMAC_DH protocols by Lv, Chao, Ma, Maode, Li, Hui, Ma, Jianfeng, Niu, Ben

    Published 2013
    “…In this paper, we first analyze the vulnerability of an AKD protocol under the off-line guessing attack. Then, we propose an enhanced AKD protocol to overcome the vulnerability. …”
    Get full text
    Get full text
    Journal Article
  20. 780