-
21
Measurement of the temperature-dependent cross-plane thermal conductivity of the Li-ion battery pouch cell
Published 2025-01-01Get full text
Article -
22
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01Get full text
Article -
23
Revival of the Moral Traditions in Red Army During the Great Patriotic War
Published 2015-06-01Get full text
Article -
24
»V imenu narodov Jugoslavije!« Procesi pred vojaškimi sodišči poleti 1945
Published 2024-12-01Get full text
Article -
25
-
26
Effect of Al2O3 on the Tensile and Impact Strength of Flax/Unsaturated Polyester Composite with Emphasis on Automobile Body Applications
Published 2021-01-01“…This study has endeavored to develop an Al2O3-filled natural fiber reinforced polymer composite which is intended to substitute the most widely used synthetic E-glass fiber material. …”
Get full text
Article -
27
Emerging Roles of TRIM56 in Antiviral Innate Immunity
Published 2025-01-01“…The tripartite-motif protein 56 (TRIM56) is a RING-type E3 ubiquitin ligase whose functions were recently beginning to be unveiled. …”
Get full text
Article -
28
-
29
-
30
On Eternal Domination of Generalized Js,m
Published 2021-01-01“…An eternal dominating set of a graph G is a set of guards distributed on the vertices of a dominating set so that each vertex can be occupied by one guard only. …”
Get full text
Article -
31
Eternal Domination of Generalized Petersen Graph
Published 2021-01-01“…An eternal dominating set of a graph G is a set of guards distributed on the vertices of a dominating set so that each vertex can be occupied by one guard only. …”
Get full text
Article -
32
-
33
Combating economic crime in Ukraine in 1946–1949
Published 2023-12-01“…The most common crimes were the following: 1) maliciously delaying the repair of agricultural machinery, allegedly due to the lack of spare parts and specialists; 2) theft of grain during its transportation and sowing by persons responsible for this (weighers, field crew leaders, guards); 3) theft of seeds and fuel by security guards; 4) theft and embezzlement of seeds by officials of collective and state farms and subsidiary farms; 5) theft of seed by reducing the seeding rate and theft of fuel due to lack of control over its consumption; 6) theft of seeds by employees of storage facilities with their subsequent resale at markets at speculative prices; 7) creation of surplus seeds by weighing, moistening, writing off for drying, and increasing waste during sorting. …”
Get full text
Article -
34
An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations.
Published 2023“…The study aims to examine information security managerial practices in organisations. It was guided by three specific objectives: identification of information security practices critical to information assets management; establishment of implementation processes involved in the execution of structured information security governance; and evaluation of policies that influence information security best practices. …”
Get full text
Article -
35
-
36
Effect of Induced Plant Expression on Ants and Extrafloral Nectaries Number in Cotton and Castor
Published 2021-12-01Get full text
Article -
37
İngiliz Konsolos James Henry Monahan’ın Raporlarında Bitlis Vilayeti (1896-1898)
Published 2020-06-01Get full text
Article -
38
Prototype Of DPO Search Information System (People Search List) On CCTV Cameras Using Face Recognition
Published 2023-12-01Get full text
Article -
39
REPRESENTATION OF MUTUAL TERMS AND RESEARCH SKILLS TOWARDS GRADE POINT AVERAGE: EXPLORATION STUDY
Published 2018-05-01“…The result of correlation analysis shows ð¹ð‘ð‘œð‘¢ð‘›ð‘¡ = 6,147˃ 3,140 = ð¹ð‘¡ð‘Žð‘ð‘™ð‘’ = (0,05;2;64) or in other words there a relationship of IR and KR collectively to GPA. …”
Get full text
Article -
40
Fiscal Decentralisation and Services Delivery in Mbarara Central Market.
Published 2024Get full text
Thesis