Showing 361 - 380 results of 1,687 for search '(((ssspinel OR spinal) OR (pinned OR sspinned)) OR ((spina OR pin) OR (ling OR like)))', query time: 0.07s Refine Results
  1. 361

    The United Nations Security Council’s Sanctions against Iran: A Nuclear Apartheid by Eishan Jan, Mohammad Naqib

    Published 2007
    “…Why certain countries, like the United States, United Kingdom, France, Russia and China allowed to own nuclear weapons while other countries are not? …”
    Get full text
    Article
  2. 362

    In-vitro antidermatophytic activity of methanolic fraction from entada spiralis ridl. stem bark and its bioautographic profile by Harun, Aiza, Mat So'ad, Siti Zaiton, Mohd Hassan, Norazian, Che Mohd Ramli, Neni Kartini

    Published 2014
    “…This study was performed to evaluate the antifungal activities of the methanolic fractions from the stem bark of Entada spiralis Ridl. against human dermatophytes and yeast-like fungus in in vitro. Three types of human dermatophytes and one yeast-like fungus namely Trichophyton mentagrophytes ATCC 9533, Microsporum gypseum ATCC 24102, Trichophyton tonsurans ATCC 28942, and Candida glabrata ATCC 66032 were tested against the methanolic fractions labelled as FA1, FA4 and FA5. …”
    Get full text
    Get full text
    Article
  3. 363

    Islamic code of conduct for mediation: a case study of the code of conduct of Malaysian Mediation Centre (MMC) by Amanullah, Muhammad

    Published 2015
    “…In order to practice the mediation properly, this center, like many other organizations, produced its code of conducts. …”
    Get full text
    Proceeding Paper
  4. 364

    Policing terrorism in Nigeria: challenges for the 21st century by Mbaso, Chijioke Theophilius

    Published 2021
    “…The findings confirm the big gap that exits between Nigeria and the United Kingdom (UK) in terms of the overall fundamental principles of policing, like evidence-based research, policing doctrines, criminal investigation, counter terrorism strategy, training and police professionalism geared towards policing terrorism.…”
    Get full text
    Thesis
  5. 365

    Structural performance of precast self-compacting concrete beam consisiting banana skin powder and coir fibre under flexural load by Tahir, Muhammad

    Published 2018
    “…The fresh properties of SCC like filling ability, passing ability and segregation resistance were satisfied the EFNARC SCC specifications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 366

    Deep learning for face detection using matlab by Slim, Salim Adnan

    Published 2020
    “…Under this condition, it looks like the CNN and deep learning could not identify the image correctly and wrong result is showing for the second image. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 367

    Fabrication of graphene-based resistive sensor for eschericia coli bacteria sensing by Wibowo, Kusnanto Mukti

    Published 2018
    “…The presence of fecal coliform bacteria like Escherichia coli (E. coli) in aquatic environments indicates that the water has been contaminated with the fecal material of human or animals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 368

    Epistemology - An Islamic perspective by Azram, Mohammad

    Published 2011
    “…In this paper we will discuss the background of epistemology, different areas of epistemology-like source, types (revealed and derived), elements in Islam, principles (Unity of Allah, unity of creation,and unity of thoughts) and limitations.…”
    Get full text
    Article
  9. 369

    Twist analysis of piezoelectric laminated composite plates by Khan, Md. Raisuddin, Mahmood, Iskandar Al-Thani

    Published 2006
    “…Twist control of helicopter rotors, micromirrors or shafts in torsional oscillation are the active areas of research where smart materials like piezoceramic crystal or shape memory alloy can play vital roles. …”
    Get full text
    Proceeding Paper
  10. 370

    Banding for access related iscaemia : our experience in Kuantan, Malaysia by Othman, Ahmad Faidzal, Abdul Rahman, Mohd Norhisham Azmi

    Published 2014
    “…One of the recognized treatment strategies is banding of the fistula. We would like to present our result for the past year in employing this strategy in our local community in Kuantan, Malaysia…”
    Get full text
    Proceeding Paper
  11. 371

    Between monotheism and tawhid: a comparative analysis by Hashi, Abdurezak Abdulahi

    Published 2013
    “…In the contemporary academic domains, there are incidents where ‘monotheism’ and ‘tawhid’ are employed as synonymous terms; as if these concepts signify the same conceptual denotations about the belief and the unity of God; and as a result, religious faiths like Judaism, Christianity and Islam, are categorized as monotheists. …”
    Get full text
    Article
  12. 372

    On beauty: an Islamic perspective by El-Nagar, Hassan Abdelrazig

    Published 2012
    “…It starts off by identifying the real meaning of beauty in Lisan al-Arab, the famous Arabic lexicon and then attempts to explain the authentic tradition reported in Muslim in which Abdullah ibn Mas'ud relates that "Allah is Elegant and Beautiful and He like elegance and beauty". Here he researcher totally relies on the explanations of the two most noted Muslims in the area of metaphysics, namely Imam al-Ghazali and Ibn Qayyim al-Jawziyya.…”
    Get full text
    Monograph
  13. 373

    Where is the intelligence in computational intelligence? by Pathan, Al-Sakib Khan

    Published 2005
    “…However, the term is very frequently used in various fields of computer science like web intelligence, machine intelligence, artificial intelligence and overall in the computational intelligence. …”
    Get full text
    Proceeding Paper
  14. 374

    Arcosanti: grow, don't sprawl by Oropallo, Gabriele

    Published 2017
    “…The mass of Arcosanti seems to emerge from the Sonoran Desert like one of the many rocky formations that mushroom across the plains. …”
    Get full text
    Article
  15. 375

    Implementation and self-checking of different adder circuits by Hassan, Hasliza

    Published 2020
    “…Basically, all types of the complex adder circuits are made up from the simple adder circuits (or called basic building blocks of adder) like half adder and full adder.…”
    Get full text
    Book Section
  16. 376

    Annexin in plants by Phang, Ing Chia

    Published 2006
    “…Annexins are a diverse, multigene family of Ca2+-regulated phospholipids and membrane-binding protein. An annexin-like protein in higher plants was first discovered in 1989. …”
    Get full text
    Proceeding Paper
  17. 377

    An artificial-intelligence-based approach for audio steganography by Zamani, Mazdak, Taherdoost, Hamed, Abdul Manaf, Azizah, Ahmad, Rabiah, Zeki, Akram M.

    Published 2009
    “…The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.…”
    Get full text
    Article
  18. 378

    Health Risks of Overweight and Obesity - An Over View by Afridi, Aien Khan, Khattak, Muhammad Muzaffar Ali Khan, Safdar, Mahfara, Khan, Alam

    Published 2003
    “…Obesity is a risk factor for the development of various diseases like CHD, hypertension, stroke, NIDDM, osteoarthritis, sleep apnea and cancers of endometrium, breast, prostrate and colon. …”
    Get full text
    Article
  19. 379

    Speech coding techniques and algorithms by A.Kassim, Liban, Khalifa, Othman Omran, Gunawan, Teddy Surya

    Published 2011
    “…Due to the growing need for bandwidth conservation and enhanced quality in wireless cellular and satellite communication, the research of low bit rate speech coder with acceptable quality is becoming increasingly important. Applications like Digital cellular and satellite telephony, video conferencing and internet voice communications, all have an increasing demand efficient use of bandwidth without compromising the quality…”
    Get full text
    Book Chapter
  20. 380

    Security of present s-box by Taha, Imad, Salim, Sufyan

    Published 2012
    “…Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. …”
    Get full text
    Proceeding Paper