Search Results - defensive end

Refine Results
  1. 1
  2. 2

    Coping with childhood trauma: the unnamed narrator's defense mechanisms in Neil Gaiman's The Ocean at the End of the Lane (2013) by Ong, Li Yuan, Ali Termizi, Arbaayah

    Published 2018
    “…Through the uses of various literary genres in his novels and short stories, Gaiman highlights the themes of childhood trauma and the character’s self-identity in The Ocean at the End of the Lane (2013). In this paper, the main protagonist’s struggles in coping with adulthood are interpreted using repression and denial as his primary defense mechanisms. …”
    Get full text
    Get full text
  3. 3

    WebGL tower defense game with implementation of A* intelligence technique by Kang, Cheng Yong

    Published 2014
    “…This reseach focused on intelligent strategy game named Tower Defense which allow good interaction between players and the game. …”
    Get full text
    Get full text
  4. 4

    17 KOR SISPA UMPSA students receive certificate of Civil Defense Junior Lieutenant by Nor Salwana, Mohammad Idris

    Published 2024
    “…PAGOH, 18 August 2024 – A total of 17 Civil Defense Student Corps (SISPA) students from Universiti Malaysia Pahang Al-Sultan Abdullah (UMPSA) received their credentials as Civil Defense Junior Lieutenants during the Civil Defense Student Corps End of Training Parade (KOR SISPA) National Level 15th Year 2024 at Padang Kawad, Universiti Tun Hussein Onn Malaysia (UTHM).…”
    Get full text
    Get full text
  5. 5
  6. 6
  7. 7
  8. 8

    To what extent does the corporate persona impinge upon the ethical self? An insight into the legal sector and the oil and gas industry in Singapore by Jeyaraj, Indumathi

    Published 2017
    “…Kantian ethics, more specifically, Kant’s second formulation of the categorical imperative, dictates that a person ought not to be treated as the means to an end but rather an end in itself. Gleaning from this, it is interesting to consider whether the ethical self is respected in the work realm. …”
    Get full text
  9. 9

    Consumption of Malay Herbal Medicine (MHMs) during pregnancy and postpartum by Ahmad Bustami, Normina, T., Noradhiah, Ho, Yu Bin, C. K., Tan, Marjan Sadat, Seghayat, Kandiah, Mirnalini, Aris, Ahmad Zaharin, Tan, Eugenie Sin Sing

    Published 2019
    “…Higher dangers of neonatal jaundice were found for baby blues utilization. As an end, family unit salary was an affecting statistic factor for MHMs utilization. …”
    Get full text
    Get full text
  10. 10

    A psychosocial approach to understanding the capacities to care and think critically in student mental health nurses by Dixon, Julie

    Published 2019
    “…They were each interviewed once at the beginning and once towards the end of their final semester of the pre-registration programme (twice each). …”
    Get full text
  11. 11

    Exploring pre-university students’ construction of reasoned argumentation during computer - supported collaborative discussions using sequential analysis by Panir Selvam, Pavithra, Ma’rof, Aini Marina

    Published 2021
    “…The current study therefore sought to investigate the development of reasoned argumentation skills among pre- university students with mixed language abilities, using open-ending short stories via a computer-supported collaborative learning (CSCL) environment. …”
    Get full text
    Get full text
  12. 12
  13. 13

    Mitigation Of Syn-Flooding Attack Using High Speed Programmable Network Processor by Lim, Boon Ping

    Published 2006
    “…Our solution is an end-point-based autonomous system which is deployable at both source and victim network's border routers.…”
    Get full text
  14. 14

    Theoretical foundations of uncertain event prognosis and predictive Bayesian Cramer-Rao bounds by Acuña Ureta, David E.

    Published 2020
    “…Both contributions are illustrated in the light of the problem of End-of-Discharge (EoD) time prognosis of Lithium-Ion batteries. …”
    Get full text
  15. 15

    Efficacy of Centella Asiatica in Reducing Oxidative Stress in Hydrogen Peroxideinduced Sprague Dawley Rats by Hussin, Mahanom

    Published 2005
    “…Histopathological examination of the heart, liver and kidney of the rats was done after the treatments ended. Results of the study indicated that Centella asiatica extract and powder significantly (p<0.05) increased serum HDL and cholesterol level compared to normal rats.Centella asiatica extract and powder also significantly lowered serum TG and LDL concentrations compared to normal rats at the end of the study. …”
    Get full text
    Get full text
  16. 16

    Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet by Khan, Samia

    Published 2018
    “…Moreover, this proposed solution endeavours higher packet delivery ratio with relatively less end to end delay (EED) when compared to two recent research works (LSAM and HMAC).…”
    Get full text
    Get full text
  17. 17

    Genomic characterisation of Iraqi indigenous taurine x zebu crossbred cattle by Alshawi, Akil

    Published 2019
    “…The aim here was to identify candidate genomic regions for adaptive immunity genes. To this end, we performed Integrated Haplotype Score within populations (iHS), Relative integrated EHH of a site between populations (Rsb), and Inter-population Wright’s (Fst) analysis. …”
    Get full text
  18. 18

    The U.S. – Japan Alliance and Asia-Pacific Security: implications for Japan-Taiwan relations by Kuo, Wen Kuo, Hsiang, Yi Yeh

    Published 2015
    “…The end of the Cold War has brought tremendous changes in the international system. …”
    Get full text
    Get full text
  19. 19

    Evaluating Chris Argyris's ideas: an Islamic perspective by Fontaine, Rodrigue Ancelot Harvey, Oziev, Gapur, Hassan-Hussein, Hussein

    Published 2012
    “…Design/methodology/approach – The main approach is a literature review combined with an analysis based on Islamic principles. At the end, there is a short case study that demonstrates the possible application for practitioners. …”
    Get full text
    Get full text
  20. 20

    User access control and security model by Crysdian, Cahyo, Selamat, Harihodin, Md. Sap, Mohd. Noor

    Published 2000
    “…Comparison of each user access control method is given at the end of the paper.…”
    Get full text
    Get full text