Showing 2,501 - 2,520 results of 10,325 for search '((((pinna OR pinn) OR (pinggna OR pinggang)) OR (five OR line)) OR (bina OR ping))', query time: 0.20s Refine Results
  1. 2501

    Bolstering functionality in multilayer and bilayer WS₂ via focused laser micro-engraving by Chan, Si Min, Poh, Eng Tuan, Leong, Jin Feng, Goh, Johnson Kuan Eng, Sow, Chorng Haur

    Published 2023
    “…Coupled with the flexible maneuver of the laser, various monolayer designs can be achieved, including micro-antenna, waveguide, and electrode geometries with lateral line widths at 1.5 µm resolution. Furthermore, we also detail the optical properties of the monolayers obtained from laser thinning, with those acquired from multilayers containing more defect-bound excitons, whereas those lasered from bilayers presenting a trion-dominated profile similar to as-grown monolayers. …”
    Get full text
    Journal Article
  2. 2502

    Understanding Dengue Virus Capsid Protein Interaction with Key Biological Targets by Faustino, André F., Martins, Ivo C., Carvalho, Filomena A., Castanho, Miguel A. R. B., Maurer-Stroh, Sebastian, Santos, Nuno C.

    Published 2016
    “…APOE N-terminal and PLIN3 C-terminal regions are remarkably similar, namely APOE α-helix 4 (APOEα4) and PLIN3 α-helix 5 (PLIN3α5) sequences, which are also highly superimposable structurally. …”
    Get full text
    Get full text
    Journal Article
  3. 2503

    Visual hull based 3D reconstruction of shocks in under-expanded supersonic bevelled jets by Lim, Desmond Haoxiang, New, Tze How, Mariani, Raffaello, Cui, Y. D.

    Published 2019
    “…This is key to achieving accurate and high-resolution reconstructed shock waves for both axisymmetric and asymmetric test cases with an average of 2.5% error when validated against raw schlieren images. …”
    Get full text
    Get full text
    Journal Article
  4. 2504

    Integrated optimization algorithm: a metaheuristic approach for complicated optimization by Li, Chen, Chen, Guo, Liang, Gaoqi, Luo, Fengji, Zhao, Junhua, Dong, Zhao Yang

    Published 2022
    “…IOA is synthesized from 5 sub-algorithms: follower search, leader search, wanderer search, crossover search, and role learning. …”
    Get full text
    Journal Article
  5. 2505

    Efficient visible light modulation based on electrically tunable all dielectric metasurfaces embedded in thin-layer nematic liquid crystals by Sun, Mingyu, Xu, Xuewu, Sun, Xiao Wei, Liang, Xin’an, Valuckas, Vytautas, Zheng, Yuanjin, Paniagua-Domínguez, Ramón, Kuznetsov, Arseniy I.

    Published 2019
    “…Small driving voltages from 3~5V are sufficient to tune the metasurface resonances, with an associated transmission modulation of more than 65%. …”
    Get full text
    Get full text
    Journal Article
  6. 2506

    A novel gravity-driven nanofibrous membrane for point-of-use water disinfection: polydopamine-induced in situ silver incorporation by Wang, Jianqiang, Wu, Yichao, Yang, Zhe, Guo, Hao, Cao, Bin, Tang, Chuyang Y.

    Published 2018
    “…These nanoparticles were uniformly distributed on the surface of nanofibers with no apparent agglomeration at a silver loading up to 4.36 wt.% (cPAN-Ag1.5). The silver-incorporated membrane cPAN-Ag1.5 achieved a high pure water flux of 130 Lm−2 h−1 at 10-cm water head, demonstrating the feasibility of energy-efficient gravity-driven filtration and eliminating the need for electrical power. …”
    Get full text
    Get full text
    Journal Article
  7. 2507

    The protocol of a clinical effectiveness trial comparing standard step-up care, early combination DMARD therapy and early use of TNF inhibitors for the treatment of moderate to sev... by Watson, M, Tillett, W, Jadon, D, Massa, MS, Francis, A, Gullick, N, Rombach, I, Sinomati, Y, Tucker, L, Coates, LC

    Published 2024
    “…Early use of biologics has also been shown to be superior to methotrexate but these drugs are costly and not usually funded first line. However, if a short course of biologics can rapidly suppress inflammation allowing treatment to be withdrawn and response maintained on methotrexate, this may be a cost-effective model for early use.…”
    Journal article
  8. 2508

    以“才”充“再”?以“再”充“才”?新加坡华语里“才”和“再”的使用情况 = Study of the usage of adverb cai and adverb zai in Singapore Chinese by 余依霖 Er, Yee Ling

    Published 2009
    “…According to Lu Jianming, Zhang Chuhao, Qian Ping (2002) and Xing Fuyi (2005), Singapore Chinese users tend to replace adverb zai with adverb cai. …”
    Get full text
    Final Year Project (FYP)
  9. 2509

    Tetratricopeptide repeat domain 9A modulates anxiety-like behavior in female mice by Lim, Lee Wei, Shrestha, Smeeta, Or, Yu Zuan, Tan, Shawn Zheng Kai, Chung, Hwa Hwa, Sun, Yang, Lim, Chew Leng, Khairuddin, Sharafuddin, Lufkin, Thomas, Lin, Valerie Chun Ling

    Published 2018
    “…Interestingly, the heightened anxiety in TTC9A−/− mice under EB influence is consistent with a greater induction of TPH 2, and 5-HTT by EB in DRN that play key roles in emotion regulation. …”
    Get full text
    Get full text
    Journal Article
  10. 2510

    An analysis of contact stiffness and frictional receding contacts by Parel, KS

    Published 2017
    “…The tangential contact stiffness for ground Ti-6Al-4V surfaces is measured to linearly decrease with the application of tangential load, approaching zero at slip. …”
    Thesis
  11. 2511
  12. 2512
  13. 2513

    Explainable data-driven optimization for complex systems with non-preferential multiple outputs using belief rule base by Chang, Leilei, Zhang, Limao

    Published 2022
    “…A practical case study on Changsha Metro Line 4 is studied to use multiple geological parameters to infer multiple operational parameters. …”
    Get full text
    Journal Article
  14. 2514
  15. 2515

    Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies? by Zhang, Junqing, Chang, Chip Hong, Gu, Chongya, Hanzo, Lajos

    Published 2024
    “…Device identification is the first line of defense to detect and stop fraud. Conventional device authentication schemes using software addresses as identities or static pre-programmed secret keys are vulnerable to tampering and memory attacks. …”
    Get full text
    Journal Article
  16. 2516
  17. 2517
  18. 2518
  19. 2519
  20. 2520