Showing 41 - 60 results of 10,138 for search '(((spinale OR (sspine OR sspingk)) OR five) OR ((spinae OR ssssspinga) OR pin))', query time: 0.34s Refine Results
  1. 41
  2. 42
  3. 43

    Solidification, microstructure and mechanical properties of Mg-2.8Nd-1.5Gd-0.5Zn-0.5Zr cast alloy with erbium addition by Ahmad, R., Elaswad, A.M.M., Hamzah, M. Z., Shahizan, N. R.

    Published 2018
    “…The thermal parameters of Mg-2.8Nd-1.5Gd-0.5Zn-0.5Zr cast alloy with 0.25 wt.% of erbium (Er) were evaluated by the computer-aided cooling curve thermal analysis(CA CCTA), whereas the microstructure analysis was investigated by the optical microscope and scanning electron microscopy. …”
    Get full text
    Article
  4. 44

    Design and Validation of a Compact 3.5GHz Antenna for 5G-based IoT Applications by Najib Al-Fadhali, Najib Al-Fadhali, Huda Majid, Huda Majid, Jumadi, Jumadi, Mohammed. S. M. Gismalla, Mohammed. S. M. Gismalla

    Published 2023
    “…In this research, we designed a compact wideband 3.5GHz antenna for 5G-based IoT applications using CST Studio software. …”
    Get full text
    Article
  5. 45
  6. 46

    Minutes of meeting. 5 March 1987 by Council of Irish County Associations, CICA

    Published 1987
    “…Minutes of the meeting of Council of Irish County Associations (CICA), held on 5 March 1987. Three manuscript papers inserted in the minute book 1983-1987.…”
    Get full text
    Get full text
    Minutes
  7. 47

    Minutes of meeting. 5 May 1981 by Leitrim Association, LA

    Published 1981
    “…Typewritten minutes of meeting of Leitrim Association in London, held on 5 May 1981. Includes Silver Jubilee guest list and agenda for the meeting on 18 May 1981.…”
    Get full text
    Minutes
  8. 48
  9. 49
  10. 50
  11. 51
  12. 52

    Achieving security for images by LSB and MD5 by Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, O. Alhussainan, Sondos

    Published 2012
    “…This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. …”
    Get full text
    Article
  13. 53
  14. 54
  15. 55
  16. 56
  17. 57
  18. 58
  19. 59
  20. 60