-
701
Research on the Design and Construction Technology of Double Strand Chain Transmission of Escalator
Published 2020-03-01Get full text
Article -
702
Matriarchal Exemplarity in Elizabeth Isham’s Booke of Rememberance
Published 2023-06-01Get full text
Article -
703
Family Law /
Published 2015Table of Contents: “…-- Marriage -- Nullity -- Divorce : the theoretical background -- Divorce : the contemporary process -- Divorce : non-court dispute resolution -- Financial provision on divorce or dissolution -- Civil partnership -- Cohabitation -- Financial support without decree -- Domestic violence and forced marriage -- The Children Act 1989 -- Parentage, parental responsibility and human assisted reproduction -- Children's rights, autonomy and medical treatment -- The child's welfare -- Section 8 and the CAO -- Making contact orders work -- International child abduction and relocation -- Child protection : wardship, the inherent jurisdiction and the CA 1989 -- Care, supervision and protection orders -- Financial provision for children -- Adoption.…”
View in OPAC
Book -
704
-
705
The Effect of Probiotics on Childhood Constipation: A Randomized Controlled Double Blind Clinical Trial
Published 2014-01-01“…In this placebo controlled trial, fifty-six children aged 4–12 years with constipation received randomly lactulose plus Protexin or lactulose plus placebo daily for four weeks. …”
Get full text
Article -
706
La arquitectura de tierra de Mesoamérica
Published 2018-07-01“…Los sistemas constructivos originales parecieran provenir de Sudamérica, derivados de la construcción con tierra compactada de la vertiente atlántica y de la construcción con adobes planoconvexos de la vertiente pacífica andina. …”
Get full text
Article -
707
Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical IoT
Published 2025-01-01“…The proposed protocol utilizes a post-quantum fuzzy commitment (PQFC) scheme to enhance security and is rigorously analyzed under the random oracle model and ProVerif tool. Its functionality and security are thoroughly assessed, demonstrating adherence to key requirements such as memoryless operation, user anonymity, mutual authentication, and resistance to various threats, including biometric tampering, stolen-verifier attacks, and insider attacks. …”
Get full text
Article -
708
Speaking of Animals: A Conceptual analysis of Animal Metaphors in Yoruba
Published 2023-11-01Get full text
Article -
709
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
Published 2025-01-01“…The security of the ECAUP is formally verified using BAN Logic and ProVerif, and a comparative analysis demonstrates its superiority in terms of overhead efficiency (more than 50%) and security features over existing protocols. …”
Get full text
Article -
710
-
711
Inscription spatiale des trajectoires de recours aux soins à São Paulo et inégalités urbaines
Published 2021-12-01Get full text
Article -
712
Assessment of College Entrepreneurship and Innovation Education Effect for Sci-Tech Service Industry
Published 2022-01-01Get full text
Article -
713
The anchor of a modal superlative and the individual vs stage level reading of the adjective
Published 2024-12-01Get full text
Article -
714
-
715
-
716
A Simplified Sine Cosine Algorithm for the Solution of Optimal Reactive Power Dispatch
Published 2022-01-01Get full text
Article -
717
Research on inverse solution of shotcrete manipulators based on an improved bee colony algorithm
Published 2025-01-01Get full text
Article -
718
Approach for Text Classification Based on the Similarity Measurement between Normal Cloud Models
Published 2014-01-01Get full text
Article -
719
Failure Analysis of the Pin Bore of the Combined Piston for the Aero Engine
Published 2019-01-01Get full text
Article -
720