Showing 261 - 280 results of 1,592 for search '((pinnae OR (spinge OR (sspinge OR ssping))) OR ((like OR ((sspinn OR ssspie) OR pink)) OR pin))', query time: 0.09s Refine Results
  1. 261

    In-vitro antidermatophytic activity of methanolic fraction from entada spiralis ridl. stem bark and its bioautographic profile by Harun, Aiza, Mat So'ad, Siti Zaiton, Mohd Hassan, Norazian, Che Mohd Ramli, Neni Kartini

    Published 2014
    “…This study was performed to evaluate the antifungal activities of the methanolic fractions from the stem bark of Entada spiralis Ridl. against human dermatophytes and yeast-like fungus in in vitro. Three types of human dermatophytes and one yeast-like fungus namely Trichophyton mentagrophytes ATCC 9533, Microsporum gypseum ATCC 24102, Trichophyton tonsurans ATCC 28942, and Candida glabrata ATCC 66032 were tested against the methanolic fractions labelled as FA1, FA4 and FA5. …”
    Get full text
    Get full text
    Article
  2. 262

    Islamic code of conduct for mediation: a case study of the code of conduct of Malaysian Mediation Centre (MMC) by Amanullah, Muhammad

    Published 2015
    “…In order to practice the mediation properly, this center, like many other organizations, produced its code of conducts. …”
    Get full text
    Proceeding Paper
  3. 263

    Policing terrorism in Nigeria: challenges for the 21st century by Mbaso, Chijioke Theophilius

    Published 2021
    “…The findings confirm the big gap that exits between Nigeria and the United Kingdom (UK) in terms of the overall fundamental principles of policing, like evidence-based research, policing doctrines, criminal investigation, counter terrorism strategy, training and police professionalism geared towards policing terrorism.…”
    Get full text
    Thesis
  4. 264

    Structural performance of precast self-compacting concrete beam consisiting banana skin powder and coir fibre under flexural load by Tahir, Muhammad

    Published 2018
    “…The fresh properties of SCC like filling ability, passing ability and segregation resistance were satisfied the EFNARC SCC specifications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 265

    Deep learning for face detection using matlab by Slim, Salim Adnan

    Published 2020
    “…Under this condition, it looks like the CNN and deep learning could not identify the image correctly and wrong result is showing for the second image. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 266

    Fabrication of graphene-based resistive sensor for eschericia coli bacteria sensing by Wibowo, Kusnanto Mukti

    Published 2018
    “…The presence of fecal coliform bacteria like Escherichia coli (E. coli) in aquatic environments indicates that the water has been contaminated with the fecal material of human or animals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 267

    Epistemology - An Islamic perspective by Azram, Mohammad

    Published 2011
    “…In this paper we will discuss the background of epistemology, different areas of epistemology-like source, types (revealed and derived), elements in Islam, principles (Unity of Allah, unity of creation,and unity of thoughts) and limitations.…”
    Get full text
    Article
  8. 268

    Twist analysis of piezoelectric laminated composite plates by Khan, Md. Raisuddin, Mahmood, Iskandar Al-Thani

    Published 2006
    “…Twist control of helicopter rotors, micromirrors or shafts in torsional oscillation are the active areas of research where smart materials like piezoceramic crystal or shape memory alloy can play vital roles. …”
    Get full text
    Proceeding Paper
  9. 269

    Banding for access related iscaemia : our experience in Kuantan, Malaysia by Othman, Ahmad Faidzal, Abdul Rahman, Mohd Norhisham Azmi

    Published 2014
    “…One of the recognized treatment strategies is banding of the fistula. We would like to present our result for the past year in employing this strategy in our local community in Kuantan, Malaysia…”
    Get full text
    Proceeding Paper
  10. 270

    Between monotheism and tawhid: a comparative analysis by Hashi, Abdurezak Abdulahi

    Published 2013
    “…In the contemporary academic domains, there are incidents where ‘monotheism’ and ‘tawhid’ are employed as synonymous terms; as if these concepts signify the same conceptual denotations about the belief and the unity of God; and as a result, religious faiths like Judaism, Christianity and Islam, are categorized as monotheists. …”
    Get full text
    Article
  11. 271

    On beauty: an Islamic perspective by El-Nagar, Hassan Abdelrazig

    Published 2012
    “…It starts off by identifying the real meaning of beauty in Lisan al-Arab, the famous Arabic lexicon and then attempts to explain the authentic tradition reported in Muslim in which Abdullah ibn Mas'ud relates that "Allah is Elegant and Beautiful and He like elegance and beauty". Here he researcher totally relies on the explanations of the two most noted Muslims in the area of metaphysics, namely Imam al-Ghazali and Ibn Qayyim al-Jawziyya.…”
    Get full text
    Monograph
  12. 272

    Where is the intelligence in computational intelligence? by Pathan, Al-Sakib Khan

    Published 2005
    “…However, the term is very frequently used in various fields of computer science like web intelligence, machine intelligence, artificial intelligence and overall in the computational intelligence. …”
    Get full text
    Proceeding Paper
  13. 273

    Arcosanti: grow, don't sprawl by Oropallo, Gabriele

    Published 2017
    “…The mass of Arcosanti seems to emerge from the Sonoran Desert like one of the many rocky formations that mushroom across the plains. …”
    Get full text
    Article
  14. 274

    Implementation and self-checking of different adder circuits by Hassan, Hasliza

    Published 2020
    “…Basically, all types of the complex adder circuits are made up from the simple adder circuits (or called basic building blocks of adder) like half adder and full adder.…”
    Get full text
    Book Section
  15. 275

    A study of touching behavior for authentication in touch screen smart devices by Alariki, Ala Abdulhakim, Abdul Manaf, Azizah, Khan, Sheroz

    Published 2016
    “…Due to increasing demand for safer access in touch screen mobile phones, old strategies like pins, tokens, or passwords have failed to stay abreast of the challenges. …”
    Get full text
    Get full text
    Proceeding Paper
  16. 276

    Annexin in plants by Phang, Ing Chia

    Published 2006
    “…Annexins are a diverse, multigene family of Ca2+-regulated phospholipids and membrane-binding protein. An annexin-like protein in higher plants was first discovered in 1989. …”
    Get full text
    Proceeding Paper
  17. 277

    An artificial-intelligence-based approach for audio steganography by Zamani, Mazdak, Taherdoost, Hamed, Abdul Manaf, Azizah, Ahmad, Rabiah, Zeki, Akram M.

    Published 2009
    “…The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.…”
    Get full text
    Article
  18. 278

    Health Risks of Overweight and Obesity - An Over View by Afridi, Aien Khan, Khattak, Muhammad Muzaffar Ali Khan, Safdar, Mahfara, Khan, Alam

    Published 2003
    “…Obesity is a risk factor for the development of various diseases like CHD, hypertension, stroke, NIDDM, osteoarthritis, sleep apnea and cancers of endometrium, breast, prostrate and colon. …”
    Get full text
    Article
  19. 279

    Speech coding techniques and algorithms by A.Kassim, Liban, Khalifa, Othman Omran, Gunawan, Teddy Surya

    Published 2011
    “…Due to the growing need for bandwidth conservation and enhanced quality in wireless cellular and satellite communication, the research of low bit rate speech coder with acceptable quality is becoming increasingly important. Applications like Digital cellular and satellite telephony, video conferencing and internet voice communications, all have an increasing demand efficient use of bandwidth without compromising the quality…”
    Get full text
    Book Chapter
  20. 280

    Security of present s-box by Taha, Imad, Salim, Sufyan

    Published 2012
    “…Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. …”
    Get full text
    Proceeding Paper