Showing 521 - 540 results of 836 for search '((spinnata OR ((pink OR ainaa) OR (spingn OR spins))) OR ((chain OR chan) OR (sbinal OR pin)))', query time: 0.08s Refine Results
  1. 521

    A 10 C’s of social networking, interconnections and the impact on social networking by Dar, Humaira, Shah, Asadullah

    Published 2013
    “…All these 10 C's are one way or another are related as chain of activities with each other. For example, Community is one of the fundamental concepts of SNs, Connection, Communication and Collaboration are inherently embedded with groups. …”
    Get full text
    Proceeding Paper
  2. 522

    Forward and Inverse Kinematics Seamless Matching using Jacobian by Z., Bhatti, Shah, Asadullah, F., Shahidi, M., Karbasi

    Published 2013
    “…In this paper the problem of matching Forward Kinematics (FK) motion of a 3 Dimensional (3D) joint chain to the Inverse Kinematics (IK) movement and vice versa has been addressed. …”
    Get full text
    Article
  3. 523

    Ergodicity of nonlinear Markov operators on the finite dimensional space by Saburov, Mansoor

    Published 2016
    “…A nonlinear Markov chain is a discrete time stochastic process whose transition matrices may depend not only on the current state of the process but also on the current distribution of the process. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 524

    Securing sensor reports in wireless sensor networks by Pathan, Al-Sakib Khan, Hong, Choong Seon

    Published 2007
    “…In this paper, we propose a scheme for securing the sensor reports in a wireless sensor network. We use one-way hash chain and pre-stored shared secret keys to provide data transmission security for the reports that travel from any source node to the base station. …”
    Get full text
    Book Chapter
  5. 525
  6. 526
  7. 527

    Transducers-to-microcntroller interfaces-software solution approach by Adetunji, Lawal Wahab, Abdulaziz, Salami Femi, Khan, Sheroz, Alam, A. H. M. Zahirul, Islam, Md. Rafiqul, Hameed, Shihab A., Hassan Abdalla Hashim, Aisha

    Published 2011
    “…Interfacing devices could also be a chain of electronic components providing a preliminary stage of processing or decision required for making a processor or plant to start and stop some onward control activities…”
    Get full text
    Book Chapter
  8. 528

    Computer modeling studies of apotirucallane triterpenes in solution by Ibrahim Ali , Noorbatcha

    Published 2005
    “…We find that the inclusion of solvation effects of the polar side chain is crucial for the interpretation of NMR data. …”
    Get full text
    Article
  9. 529

    An undiagnosed non functioning retroperitoneum paraganglioma, complicating a gynaecological surgery; a case report by Abd. Wahab, Noraziana, Gharib Bilal, Hakim, Zakaria, Alik Riasadesa, Awang, Mokhtar

    Published 2010
    “…Paragangliomas are uncommon tumors arising from the neuroendocrine elements (chief cells) of the paraganglia and symmetrically distributed along the aorta in close association with the sympathetic chain. Although functional tumors are easier to diagnose due to the clinical findings caused by excess secretion of catecholamines and an elevation of the urinary catecholamine levels, however the diagnosis of nonfunctioning paraganglioma of the retroperitoneum is diffi cult and only few cases have been made before exploratory laparotomy. …”
    Get full text
    Article
  10. 530

    Production of recombinant p53 protein by PCR-based site directed mutagenesis of plasmid DNA by Bakhtiar, M. Taher, Arief Ichwan, Solachuddin Jauhari, Abdullah, Zafirah L.

    Published 2010
    “…The purpose of the research is to produce human recombinant protein that mimic a specific mutation of the p53 gene by polymerase chain reaction (PCR) based site-directed mutagenesis of wild type p53 plasmid. …”
    Get full text
    Proceeding Paper
  11. 531

    A secure energy-efficient routing protocol for WSN by Pathan, Al-Sakib Khan, Hong, Choong Seon

    Published 2007
    “…We mainly focus on ensuring authenticity and confidentiality of the sensor reports by adopting one-way hash chain and pre-loaded shared secret keys. To achieve data freshness, there is an optional key refreshment mechanism in our protocol. …”
    Get full text
    Book Chapter
  12. 532

    Crystal Structure of gamma-Oxapentamidine complexed with d(CGCGAATTCGCG)2. the effects of drug structural change on DNA minor-groove recognition by Nunn, Christine M., Jenkins, Terence C., Neidle, Stephen

    Published 1994
    “…The y-oxapentamidine ligand interacts with the dodecamer by classic minor groove binding via interactions within the A+T-rich region of the minor groove. A chain of solvent molecules lies along the mouth of the minor groove on the outside of the bound ligand. …”
    Article
  13. 533
  14. 534

    Lead time management in the garment sector of Bangladesh: an avenues for survival and growth by Nuruzzaman, Md., Haque, A. K. M. Ahasanul

    Published 2009
    “…The study has been concluded by the development of a new diagram of business process with the outcome that the other management process in the supply chain is an important factor rather than process management in the lead time minimization process. …”
    Get full text
    Article
  15. 535

    RFID reader architectures and applications by Reaz, Mamun Bin Ibne, Uddin, Md. Jasim, Hussain Shah, Qasim, Nordin, Anis Nurashikin, Ibrahimy, Muhammad Ibn, Mohd-Yasin, Faisal

    Published 2009
    “…In order to use radio frequency identification (RFID) for wireless communication and real world applications such as supply chain management, asset tracking systems, security and privacy systems, healthcare and commercial pplications, library management systems, geographic surface location identification and industrial tracking systems, the study of the nature and characteristics of the reader is an important factor. …”
    Get full text
    Article
  16. 536

    Primary plasma cell leukemia presented as progressive paraplegia: a case report by Hasmoni, Mohamed Hadzri, Abdul Wahid, Fadilah, Cheong, Soon Keng

    Published 2009
    “…Atypical cells expressed surface and cytoplasmic lambda light chain on immunochemical studies, surface CD45 and CD38. …”
    Get full text
    Article
  17. 537

    Two-person second-order games, part 2: restructuring operations to reach a win-win profile by Larbani, Moussa, Yu, Po Lung

    Published 2009
    “…In Part 1 of the paper, using habitual domains theory and finite Markov chain theory, we have introduced a new model for describing the evolution of the states of mind of players over time, the two-person second-order game. …”
    Get full text
    Article
  18. 538

    The sensitive to freezing3 mutation of Arabidopsis thaliana is a cold-sensitive allele of homomeric acetyl-CoA carboxylase that results in cold-induced cuticle deficiencies by Amid, Azura, Lytovchenko, Anna, Fernie, Alisdair R., Warren, Garreth J., Thorlby, Glenn J.

    Published 2012
    “…Cuticle permeability was compromised in the sfr3 mutant when plants were grown in the cold but not in the warm.Wax deposition on the inflorescence stem of cold-grown sfr3 plants was inhibited and the long-chain components of their leaf cuticular wax were reduced compared with wild-type plants. …”
    Get full text
    Article
  19. 539

    Mixed-genotypes infections with hepatitis C virus in hemodialysis subjects. by Hamzah, Hairul Aini, Mustafa Mahmoud, Mohammed Imad Al-Deen, MR, Seman, BA, Nasuruddin

    Published 2012
    “…Reverse-transcription and polymerase chain reaction methods were performed using two different sets of primers, targeting the 5' untranslated region and nonstructural 5B region. …”
    Get full text
    Article
  20. 540

    Computer security self-efficacy factors influencing e-banking utilization and user satisfaction by Al-Shawabkeh, Mahmoud, Mohd Saudi, Madihah, Moha Alwi, Najwa Hayaati

    Published 2012
    “…This study designed as a part of ongoing research aims to extend the Technology-to-Performance Chain (TPC) model by including the Computer Security Self-Efficacy (CSSE) construct, a strategy of model extension suggested by several researchers. …”
    Get full text
    Proceeding Paper