Search alternatives:
verde » verdi (Expand Search)
ceres » cereus (Expand Search), cores (Expand Search), cares (Expand Search)
uvere » ufere (Expand Search), uver (Expand Search)
verge » merge (Expand Search)
verse » averse (Expand Search), versa (Expand Search), versi (Expand Search)
bind » blind (Expand Search), find (Expand Search), bin (Expand Search)
band » land (Expand Search)
hand » had (Expand Search)
verde » verdi (Expand Search)
ceres » cereus (Expand Search), cores (Expand Search), cares (Expand Search)
uvere » ufere (Expand Search), uver (Expand Search)
verge » merge (Expand Search)
verse » averse (Expand Search), versa (Expand Search), versi (Expand Search)
bind » blind (Expand Search), find (Expand Search), bin (Expand Search)
band » land (Expand Search)
hand » had (Expand Search)
-
1
Multi-User Framework for Collaboration and Co-Creation in Virtual Reality
Published 2017Get full text
Article -
2
A systematic review of transanal total mesorectal excision: is this the future of rectal cancer surgery?
Published 2016“…The ratio of hand-sewn coloanal to stapled anastomoses performed was 2:1. …”
Journal article -
3
Maslahah and its Application in Islamic Finance
Published 2024“…Additional collateral is required, based on the principles of usul fiqh, for the renewal of mudarabah transactions. On the other hand, ta’widh and gharamah are introduced by Islamic banks to safeguard the interests of both banks and the customers. …”
Get full text
Article -
4
UVM-based PCIe interrupt model for verification of networking platform IP
Published 2023“…Besides, System Verilog is the applied hardware verification description language whose objected-oriented characteristic complies with UVM. The two operate hand-in-hand to assure reusability and standardisation. …”
Get full text
Thesis-Master by Coursework -
5
Ethical Hacking Workshop : Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity /
Published 2023“…The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools. By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively. …”
Get full text
Get full text
software, multimedia