Search alternatives:
peers » peer (Expand Search)
hackers » trackers (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
peers » peer (Expand Search)
hackers » trackers (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
-
381
How counselling psychologists address issues of race with clients from black Asian and minority ethnic backgrounds: a discourse analysis
Published 2024“…The prejudiced experiences that Black, Asian and Minority Ethnic (BAME) clients report when discussing culture, racial discrimination and race has been documented. …”
Get full text
Article -
382
Strategies of rendering difficult syntactic structures in English-Arabic simultaneous interpreting
Published 2022“…When conducted between linguistically different language pairs, simultaneous interpreting encapsulates difficulties when choosing the strategies to be used with certain syntactic structures. …”
Get full text
Thesis -
383
Acid inactivation of soybean lipoxygenase with retention of protein solubility
Published 1989“…Inactivation of lipoxygenase was found to be irreversible when treated at pH 3.0 and below, irrespective of the acids used. …”
Article -
384
Wear behaviour of NiTi shape memory alloys
Published 2016“…Further decrease was noticed when the temperature approached the Af. When tested above the Af, the coefficient of friction decreased more significantly under higher loads. …”
Get full text
Thesis -
385
Changes in the mechanical properties of human hair under various conditions
Published 2010“…This project sought to investigate the tensile properties of human hair when subjected to specific conditions which is hair coloring and exposure to chlorine. …”
Get full text
Final Year Project (FYP) -
386
Educated : a memoir /
Published [201“…When another brother got himself into college, Tara decided to try a new kind of life. …”
text -
387
Challenging the ugliness of beauty : beautification as an instrument of female agency
Published 2019“…I will proceed to illustrate two ways in which beautification can take the form of an informed personal choice. Firstly, when beautification is practiced to reclaim the power of feminine beauty, and secondly, when beautification is practiced for pleasure. …”
Get full text
Final Year Project (FYP) -
388
Detection of damaged supports under railway track based on frequency shift
Published 2017“…In fact, the natural frequencies drop clearly when the auxiliary mass moves over the damaged support. …”
Get full text
Get full text
Journal Article -
389
Residual strength of blast damaged reinforced concrete columns
Published 2010“…Exterior columns are probably the most vulnerable structural components to attacks from rebel forces. Their failure could possibly trigger a progressive collapse of an entire structure. …”
Get full text
Thesis -
390
Loss analysis of a mix-flow turbine with nozzled twin-entry volute at different admissions
Published 2020“…Opposite phenomenon happens when the majority is fed from lower part (near hub). …”
Get full text
Journal Article -
391
Pattern and process in the bill morphology of the Great Tit Parus major
Published 1987“…This was especially clear in winter, so that heritability estimates for bill characters tended to be significantly higher when the offspring were measured in summer than when measured in winter. …”
Journal article -
392
The effect of interactivity on memory.
Published 2011“…In addition, there was a significant decline in memory after making decisions that were relevant to the context, but not when decisions were un-relevant. This indicates interference in memory when making decisions that are related to the context. …”
Get full text
Final Year Project (FYP) -
393
A Study on Gender Perception of Emoticon in Computer Mediated Communication (CMC)
Published 2009“…When we use it as if, the face of the sender is in front of the computer screen when receiver receives the message. …”
Get full text
Article -
394
Body . space . generative forms.
Published 2011“…Man has employed this rule as a geometric principle when he seeks to construct forms of beauty. The human body and its proportions are often used as blueprint of measurements for constructing regulating lines and division of spaces. …”
Get full text
Final Year Project (FYP) -
395
Activity detection and analysis on Android
Published 2015“…Tracking and learning the activity patterns of an individual is vital when providing healthcare and awareness to the needy such as the elderly or healthcare patients. …”
Get full text
Final Year Project (FYP) -
396
Effects of geometrical parameters on performance of miniature centrifugal pump
Published 2014“…The shock loss is 9% of the theoretical head when the blade angle is 45˚ and is 70% when the blade angle is 30˚. …”
Get full text
Thesis -
397
Antidiscriminatory privacy
Published 2019“…This article offers a theoretical framework for determining, with a view of preventing discrimination, when personal information should flow and when it should not. …”
Journal article -
398
A counterexample to the coarse Menger conjecture
Published 2025“…<p>Menger’s well-known theorem from 1927 characterizes when it is possible to find k vertex-disjoint paths between two sets of vertices in a graph G. …”
Journal article -
399
Detection of latent fingerprint using optical technique
Published 2008“…Sensitive detection techniques are needed when dealing with very weak fluorescence signals from the test samples. …”
Get full text
Research Report -
400
The Mark of Cain: The crime of terrorism in times of armed conflict as interpreted by the Court of Appeal of England and Wales in R v. Mohammed Gul
Published 2013“…On 22 February 2012, the Court of Appeal of England and Wales was called on to interpret the definition of the crime of terrorism as contained in relevant United Kingdom (UK) legislation. When confronted with defence arguments grounded in international law, the Court denied that attacks by non-state armed groups against governmental armed forces in a non-international armed conflict may be exempted from being labelled as terrorist acts. …”
Journal article