Showing 321 - 340 results of 1,330 for search '(mild OR (fill OR all)) (((grinding OR binding) OR findings))', query time: 0.16s Refine Results
  1. 321
  2. 322

    Performance obligations for “revenue from contracts with customers” principle in the shipping industry by Duru, Okan, Mileski, Joan P., Gunes, Ergun

    Published 2023
    “…Research limitations/implications: It is obviously impossible to observe all kinds of freight market transactions for all different kinds of vessel particulars. …”
    Get full text
    Journal Article
  3. 323
  4. 324

    Overexpression of 4EBP1, p70S6K, Akt1 or Akt2 differentially promotes Coxsackievirus B3-induced apoptosis in HeLa cells by Xing, X., Huang, L., Li, X., Li, Z., Zhou, W., Tian, L., Chen, J., Chen, C., Ma, Xing, Yang, Z.

    Published 2015
    “…To further illustrate it, Homo sapiens eIF4E-binding protein 1 (4EBP1), p70S6 kinase (p70S6K), Akt1 and Akt2 were transfected to HeLa cells, respectively. …”
    Get full text
    Get full text
    Journal Article
  5. 325

    Development of a vision-based gesture human-computer interface by Lim, Chun Ping.

    Published 2010
    “…Hence, VG HCI emerged to fill this discontinuity. Hand gesture combined with vision, being the most fundamental and universal form of communicative means, is ideal for being developed as an intuitive HCI. …”
    Get full text
    Final Year Project (FYP)
  6. 326
  7. 327

    Ideal invisibility cloak for heat flow by Tan, Edmund Xin Da

    Published 2021
    “…But only a few in literature designed the thermal invisibility cloak. To date, all the thermal invisibility cloaks only work for normal incidence. …”
    Get full text
    Final Year Project (FYP)
  8. 328

    Demonstratives in Singapore Malay : expression of stance through the use of Itu and Ini by Soffia Ghazali

    Published 2016
    “…Demonstratives are a basic aspect of language and thought of to be a feature that is available in all languages (Dixon, 2003; Diessel, 1999). This study examines the use of demonstratives in Singapore Malay and whether demonstratives play any part in the expression of stance of the speaker. …”
    Get full text
    Final Year Project (FYP)
  9. 329

    The effect of defining model on the accuracy of syntactic class identification in when-definitions in digital dictionaries by Ptasznik, Bartosz, Lew, Robert

    Published 2024
    “…The article concludes with practical recommendations for digital lexicography for learners of English that follow from our findings.…”
    Get full text
    Article
  10. 330

    Syarikat Abdul Rahman Pandak: Embarking Business Growth Strategy and Sustainability for Nestle Product (S/O 14810) by Badlishah, Shahrizal, Ab Hamid, Kamal

    “…In this case, the user needs to learn to identify the success factor in maintaining the business in order to attain up to the current acheivement This case might not reflect the distribution prespective of a distribution business for all Nestle’s distributors in Malaysia, but it is more towards understanding how the development of business culture, particularly in the Human Resource Management (HRM) function adapted by Syarikat Abdul Rahman Pandak Ismail Sdn Bhd (SARPISB). …”
    Get full text
    Monograph
  11. 331

    Global incidence, prevalence, years lived with disability (YLDs), disability-adjusted life-years (DALYs), and healthy life expectancy (HALE) for 371 diseases and injuries in 204 co... by Ferrari, AJ, Santomauro, DF, Aali, A, Lacey, BWH, Rodriguez, JAB

    Published 2024
    “…For three decades, the Global Burden of Diseases, Injuries, and Risk Factors Study (GBD) has filled that need. A global network of collaborators contributed to the production of GBD 2021 by providing, reviewing, and analysing all available data. …”
    Journal article
  12. 332

    Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries by Blessing, Jenny, Specter, Michael A., Weitzner, Daniel J.

    Published 2024
    “…We collect data from the National Vulnerability Database, individual project repositories and mailing lists, and other relevant sources for all widely used cryptographic libraries. In our investigation of the causes of these vulnerabilities, we find evidence of a correlation between the complexity of these libraries and their (in)security, empirically demonstrating the potential risks of bloated cryptographic codebases. …”
    Get full text
    Article
  13. 333

    Design thinking in physical and virtual environments: Conceptual foundations, qualitative analysis, and practical implications by Minet, Alice, Wentzel, Daniel, Raff, Stefan, Garbas, Janina

    Published 2024
    “…Next, we pursued an exploratory qualitative study by conducting 41 in-depth interviews with DT experts from research and practice. Our findings show that the DT format has profound effects across all phases of the DT process. …”
    Get full text
    Get full text
    Article
  14. 334

    Event detection in spatiotemporal soccer data using neural networks by Wilbert

    Published 2021
    “…Among the neural networks tested, ANN(4) achieved the best performance across all events. However, all neural networks were unable to detect ‘Tackle’ event successfully. …”
    Get full text
    Final Year Project (FYP)
  15. 335

    Modeling and analysis of thermal storage for a district cooling system (DCS) by Ong, Zhiguan.

    Published 2009
    “…Lower energy consumption is observed for all chiller combinations in a DCS when compared against building specific systems. …”
    Get full text
    Final Year Project (FYP)
  16. 336

    The role of executive function in cognitive reappraisal: a meta-analytic review by Toh, Wei Xing, Keh, Jun Sheng, Gross, James J., Carstensen, Laura L.

    Published 2024
    “…Our meta-analytic findings offer modest support for the idea that EFs are cognitive constituents of reappraisal processes.…”
    Get full text
    Journal Article
  17. 337

    Hamiltonian non-Hermicity: accurate dynamics with the multiple Davydov D2 Ansätze by Zhang, Lixing, Shen, Kaijun, Yan, Yiying, Sun, Kewei, Gelin, Maxim F., Zhao, Yang

    Published 2024
    “…As illustrative examples, three systems of interest have been studied, a non-Hermitian system of dissipative Landau-Zener transitions, a non-Hermitian multimode Jaynes-Cummings model, and a dissipative Holstein-Tavis-Cummings model, all of which are shown to be effectively described by the mDA method. …”
    Get full text
    Journal Article
  18. 338

    Design of a 100W PV based power supply for lead acid battery charging with MPPT circuit by Erping

    Published 2015
    “…Modelling of each component namely the Photovoltaic cell, DC-DC Converter, MPPT Circuit and Battery Charging circuit are being done all through the PSIM software and are simulated to provide the results of the findings given the variables involved. …”
    Get full text
    Final Year Project (FYP)
  19. 339

    The effects of fear appeal message repetition on perceived threat, perceived efficacy, and behavioral intention in the extended parallel process model by Shi, Jingyuan (Jolie), Smith, Sandi W.

    Published 2015
    “…The behavioral intentions of all recommended behaviors did not change after repeated exposure to the message. …”
    Get full text
    Get full text
    Journal Article
  20. 340

    Associations of treatment with hypnotics with suicide and attempted suicide: A nationwide cohort study by Høier, NK, Madsen, T, Spira, AP, Hawton, K, Jennum, P, Nordentoft, M, Erlangsen, A

    Published 2025
    “…While existing evidence has established findings of associations, more knowledge is needed regarding benzodiazepine (BZD) and non-benzodiazepine (n-BZD) hypnotics.…”
    Journal article