-
521
Development of remote operability CNC milling
Published 2010“…Attachment consists of three main equipments; material indexing device, Sub clamp with pin and vise index…”
Get full text
Proceeding Paper -
522
The system architecture of E-braille by using the microcontroller and external controller unit
Published 2016“…This refreshable braille cell can refresh the character. The pin for each braille cell is controlled by using piezoelectric bimorph. …”
Get full text
Get full text
Article -
523
-
524
Pricing efficiency of the 3-month KLIBOR futures contracts: An empirical analysis
Published 2009“…The study spans the contract's entire 10-year history, June 1996 to June 2006. In line with findings in other markets, we find a pre-ponderance of overpricing. …”
Get full text
Article -
525
A modified weight optimisation for higher-order neural network in time series prediction
Published 2020“…The MCS-MCMC results is further benchmarked with the standard Multilayer Perceptron, standard Pi-Sigma Neural Network (PSNN), Pi-Sigma Neural Network-Modified Cuckoo Search, Pi-Sigma Neural Network-Markov chain Monté Carlo, standard Functional Link Neural Network (FLNN), Functional Link Neural Network-Modified Cuckoo Search and Functional Link Neural Network-Markov chain Monté Carlo which emphasis in optimising the accuracy rate. …”
Get full text
Get full text
Get full text
Thesis -
526
Evaluation of classifiers in a pressure and latency-based typing biometric system
Published 2011“…System authentication in present time relies on validation by some sort of a password or Personal Identification Number (PIN). However, if an intruder discovers this password or PIN, the user’s account can be easily compromised. …”
Get full text
Proceeding Paper -
527
Multi-Mode Yagi Uda Patch Array Antenna With Non-Linear Inter-Parasitic Element Spacing
Published 2023“…Applying the inter-parasitic element spacing’s optimization and minimizing the switching circuitry using four RF PIN diodes on the parasitic elements have contributed to the gain achievement of more than 7 dBi.…”
Get full text
Article -
528
Histopathological effects of Eurycoma Longifolia jack extract (tongkat ali) on the prostate of rats
Published 2013“…However, although very widely used, it’s possible adverse effects are poorly studied .The objective of this study is to find out if there are any pathological changes that occur in the prostate of rats due to consumption of E.L. root extract. …”
Get full text
Article -
529
Opinion on the compatibility of the Anti-Counterfeiting Trade Agreement (ACTA) with the European Convention on Human Rights & the EU Charter of Fundamental Rights
Published 2011“…It follows a request to find out “if the final Version of ACTA and its foreseen legislative procedure is in line with the Treaties of the European Union and which legal possibilities there are for the European Parliament to challenge this in front of the European Court of Justice.” …”
Get full text
Monograph -
530
Low–lying states of odd nuclei in the south–west 204Pb region
Published 2013“…The predicted low-lying levels (energies, spins and parities) and B(E2) values results were reasonably consistent with the available experimental data.…”
Get full text
Article -
531
Ising model with competing “uncle–nephew” interactions
Published 2016“…We consider the Ising model on the semi-infinite Cayley tree of second order with competing interactions up to the third-nearest-neighbors with spins belonging to the different branches of the tree and for this model investigate the problem of phase transition.…”
Get full text
Get full text
Get full text
Article -
532
Granting employee stock options (ESOs), market reaction and financial performance
Published 2009“…Furthermore, stock prices do not seem to recover to pre-announcement levels during at least the subsequent 20 trading days or one calendar month. In line with US findings, operating performance deteriorates for ESO companies. …”
Get full text
Article -
533
Network forensics: detection and mitigation of botnet malicious code via darknet
Published 2012“…Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. …”
Get full text
Get full text
Book Chapter -
534
Uniform stability and weak ergodicity of nonhomogeneous Markov chains defined on ordered Banach spaces with a base
Published 2016“…These results are even new in case of von Neumann algebras. Moreover, we find necessary and sufficient conditions for the weak ergodicity of NDMC. …”
Get full text
Get full text
Article -
535
Anticancer peptides derived from Supermeal worm, Zophobas morio
Published 2016“…Currently, the search for anticancer compounds has garner a lot of interest, especially in finding them from the natural sources. In this study, compounds, supposedly peptides, extracted from cheap, easily maintained Supermeal worm (Zophobas morio) using two types of acidified organic solvent, ethanol and isopropanol, were shown to inhibit the growth of MCF-7, a breast cancer cell line. …”
Get full text
Proceeding Paper -
536
Making a commercial atomic force microscope more accurate and faster using positive position feedback control
Published 2009“…Experimental results show that by implementing the PPF control scheme, relatively good images in comparison with a well-tuned PI controller can still be obtained up to line scan of 60 Hz.…”
Get full text
Article -
537
Position of static cylinder effect on base flows
Published 2020“…It is found that the control has marginally influenced the base and wall flow field when the control was placed at different positions along the imaginary line from separation to reattachment angled at 30° to the horizontal base and the flow field in the base area along the separation line is mostly independent of its locations except near the exit of the enlarged duct where the flow field is mostly influenced by the back pressure. …”
Get full text
Get full text
Proceeding Paper -
538
A concept of shear wall for the design of high-rise buildings construction
Published 2011“…In order to find the stiffness, the simple systems models can provide reasonable results. …”
Get full text
Book Chapter -
539
Comparison of Basic Iterative Methods Used to Solve of Heat and Fluid Flow Problems
Published 2023“…The Jacobi method, the point Gauss-Seidel method, the successive over-relaxation method (SOR), the line Gauss method (TDMA), the ADI method and Strongly Implicit (SIP) method are among the iterative approaches investigated, which are then compared to find the most optimal method. …”
Get full text
Article -
540
Comparison of Basic Iterative Methods Used to Solve of Heat and Fluid Flow Problems
Published 2023“…The Jacobi method, the point Gauss-Seidel method, the successive over-relaxation method (SOR), the line Gauss method (TDMA), the ADI method and Strongly Implicit (SIP) method are among the iterative approaches investigated, which are then compared to find the most optimal method. …”
Get full text
Article