363 results on '"Omar Hasan"'
Search Results
52. Global structural optimization and growth mechanism of cobalt oxide nanoclusters by genetic algorithm with spin-polarized DFT
53. Effect of Arsenic Exposure on Human Telomerase Reverse Transcriptase (hTERT) Gene Expression and Telomere Length in Cardiovascular Disease Susceptibility
54. Applications of quick look methods for evaluating the Middle Miocene Jeribe Formation from a selected well in Jambour Oilfield, Kurdistan Region, northern Iraq
55. A Bachelor Degree Program in IoT Engineering
56. Pseudorabies virus hijacks DDX3X, initiating an addictive 'mad itch' and immune suppression, to facilitate viral spread.
57. Pseudorabies virus hijacks DDX3X, initiating an addictive 'mad itch' and immune suppression, to facilitate viral spread
58. The Method of (Al-nasb) on (Al-qate') in the Qur'an (A Semantic Study from Interpretation and Language Scholars' Point of View)
59. Immunoglobulin G and Subclasses as Potential Biomarkers in Metastatic Melanoma Patients Starting Checkpoint Inhibitor Treatment
60. Fibroblast-expressed LRRC15 is a receptor for SARS-CoV-2 spike and controls antiviral and antifibrotic transcriptional programs
61. Pulmonary Surfactant Proteins Are Inhibited by Immunoglobulin A Autoantibodies in Severe COVID-19
62. Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey
63. Thromboelastography after Cardiopulmonary Bypass: Does it Save Blood Products?
64. Haut
65. A Privacy Preserving Prediction-based Routing Protocol for Mobile Delay Tolerant Networks.
66. A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case.
67. Privacy Preserving Reputation Management in Social Networks.
68. A case study of designed an e-learning course for electrical engineering students.
69. Sustainable PV-powered FPGA-controlled high brightness LED illumination systems.
70. An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks.
71. A self-regulating protocol for efficient routing in mobile delay tolerant networks.
72. Microwave engineering education over the web.
73. Leveraging Node Centrality and Regularity for Efficient Routing in Mobile Peer-to-Peer Networks.
74. A Privacy Preserving Reputation Protocol for Web Service Provider Selection.
75. An adaptive routing algorithm for mobile delay tolerant networks.
76. Using glycoproteomics to identify novel biomarkers for checkpoint inhibitor therapy outcome in cancer patients
77. Privacy considerations for a decentralized finance (DeFi) loans platform
78. Effect of Arsenic Exposure on Human Telomerase Reverse Transcriptase (hTERT) Gene Expression and Telomere Length in Cardiovascular Disease Susceptibility
79. Efficient privacy preserving reputation protocols inspired by secure sum.
80. k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments.
81. Adolescent physical and psychological health: Ethico-legal considerations
82. Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments.
83. Elimination of Subjectivity from Trust Recommendation.
84. L'Elimination de la subjectivité dans la recommandation de confiance.
85. Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation.
86. Establishing Trust Beliefs Based on a Uniform Disposition to Trust.
87. Medical professionalism and professional organizations
88. Pulmonary Surfactant Proteins Are Inhibited by Immunoglobulin A Autoantibodies in Severe COVID-19
89. A Conceptual Model for Implementing Gamification in Education and Its Impact on Academic Performance
90. Risk of Alzheimer's Disease Following Influenza Vaccination: A Claims-Based Cohort Study Using Propensity Score Matching
91. Overview of medical student assessment: Why, what, who, and how
92. Presence of autoantibodies in serum does not impact the occurrence of immune checkpoint inhibitor-induced hepatitis in a prospective cohort of cancer patients
93. Ocular Adverse Events Induced by Immune Checkpoint Inhibitors: A Comprehensive Pharmacovigilance Analysis
94. Health insurance and the ethical issue of equity
95. The Method of (Al-nasb) on (Al-qate') in the Qur'an (A Semantic Study from Interpretation and Language Scholars' Point of View).
96. Outstanding ethico-legal-fiqhi issues
97. A Semiotic Study of “Contemplation of Estrangement Features”: “Leave Me Alone” as a Model
98. Acute Kidney Injury in Patients of Emergency and Surgical Intensive Care Units: Incidence and Risk Factors
99. Evaluating the distinction between semantic knowledge and semantic access: Evidence from semantic dementia and comprehension-impaired stroke aphasia
100. Gamma band functional connectivity reduction in patients with amnestic mild cognitive impairment and epileptiform activity
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.