-
41
-
42
-
43
-
44
-
45
Characterization and topical delivery of phenylethyl resorcinol
Published 2019Get full text
Article -
46
Topical delivery of Niacinamide: influence of binary and ternary solvent systems
Published 2019Get full text
Article -
47
-
48
-
49
-
50
-
51
-
52
-
53
-
54
-
55
-
56
EFRAG-European Commission Sustainability Standards & ISSB Standard-Setting Process (2022–2024)
Published 2025“…This dataset comprises meeting agendas, detailed discussion papers, summaries, and audio recordings of public webcasts related to the EFRAG-European Commission Sustainability Standards and the International Sustainability Standards Board (ISSB). It spans from the initial standard-setting efforts (March 2022 for EFRAG SRB, July 2022 for ISSB) to November 2024. …”
Get full text
Dataset -
57
Development of switchable planar reflectors for beam shaping realization
Published 2016“…Higher tunable loss factor of 1.91dB was demonstrated by liquid crystal based design as compared to tunable loss factor of 1.43dB shown by PIN diode based design. The investigations were further extended by carrying out equivalent circuit analysis of PIN diode based and liquid crystal based designs for detailed characterization of reconfigurable planar reflector designs. …”
Get full text
Get full text
Get full text
Thesis -
58
Characterization of cyclic plasticity type wear mechanism for titanium alloy, TI-6AL-4V on reciprocating sliding wear test
Published 2020“…Meanwhile for the contact pin, two different diameter cylinders are used i.e Ø6.5 mm and Ø12 mm. …”
Get full text
Get full text
Get full text
Thesis -
59
Electrical breakdown and structural characterization in synthetic resins using optical techniques
Published 1992“…The early tree growth is shown to be driven by the high electrical field near the pin tip, which is itself dependent on the pin-plane electrode separation as well as the applied voltage. …”
Get full text
Thesis -
60
Evaluation of classifiers in a pressure and latency-based typing biometric system
Published 2011“…System authentication in present time relies on validation by some sort of a password or Personal Identification Number (PIN). However, if an intruder discovers this password or PIN, the user’s account can be easily compromised. …”
Get full text
Proceeding Paper