Showing 21 - 40 results of 202 for search 'Three Guards', query time: 0.08s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26

    Effect of Al2O3 on the Tensile and Impact Strength of Flax/Unsaturated Polyester Composite with Emphasis on Automobile Body Applications by Gebre Fenta Aynalem, Belete Sirahbizu

    Published 2021-01-01
    “…This study has endeavored to develop an Al2O3-filled natural fiber reinforced polymer composite which is intended to substitute the most widely used synthetic E-glass fiber material. …”
    Get full text
    Article
  7. 27

    Emerging Roles of TRIM56 in Antiviral Innate Immunity by Dang Wang, Kui Li

    Published 2025-01-01
    “…The tripartite-motif protein 56 (TRIM56) is a RING-type E3 ubiquitin ligase whose functions were recently beginning to be unveiled. …”
    Get full text
    Article
  8. 28
  9. 29
  10. 30

    On Eternal Domination of Generalized Js,m by Ramy Shaheen, Mohammad Assaad, Ali Kassem

    Published 2021-01-01
    “…An eternal dominating set of a graph G is a set of guards distributed on the vertices of a dominating set so that each vertex can be occupied by one guard only. …”
    Get full text
    Article
  11. 31

    Eternal Domination of Generalized Petersen Graph by Ramy Shaheen, Ali Kassem

    Published 2021-01-01
    “…An eternal dominating set of a graph G is a set of guards distributed on the vertices of a dominating set so that each vertex can be occupied by one guard only. …”
    Get full text
    Article
  12. 32
  13. 33

    Combating economic crime in Ukraine in 1946–1949 by V. A. Grechenko

    Published 2023-12-01
    “…The most common crimes were the following: 1) maliciously delaying the repair of agricultural machinery, allegedly due to the lack of spare parts and specialists; 2) theft of grain during its transportation and sowing by persons responsible for this (weighers, field crew leaders, guards); 3) theft of seeds and fuel by security guards; 4) theft and embezzlement of seeds by officials of collective and state farms and subsidiary farms; 5) theft of seed by reducing the seeding rate and theft of fuel due to lack of control over its consumption; 6) theft of seeds by employees of storage facilities with their subsequent resale at markets at speculative prices; 7) creation of surplus seeds by weighing, moistening, writing off for drying, and increasing waste during sorting. …”
    Get full text
    Article
  14. 34

    An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations. by Ahimbisibwe, Benjamin K., Nabende, Peter, Musiimenta, Florence

    Published 2023
    “…The study aims to examine information security managerial practices in organisations. It was guided by three specific objectives: identification of information security practices critical to information assets management; establishment of implementation processes involved in the execution of structured information security governance; and evaluation of policies that influence information security best practices. …”
    Get full text
    Article
  15. 35
  16. 36
  17. 37
  18. 38
  19. 39

    REPRESENTATION OF MUTUAL TERMS AND RESEARCH SKILLS TOWARDS GRADE POINT AVERAGE: EXPLORATION STUDY by Hasan Subekti, Wachidatul Linda Yuhanna, Herawati Susilo, Ibrohim Ibrohim, Hadi Suwono

    Published 2018-05-01
    “…The result of correlation analysis shows ð¹ð‘ð‘œð‘¢ð‘›ð‘¡ = 6,147˃ 3,140 = ð¹ð‘¡ð‘Žð‘ð‘™ð‘’ = (0,05;2;64) or in other words there a relationship of IR and KR collectively to GPA. …”
    Get full text
    Article
  20. 40