Showing 1,841 - 1,860 results of 3,355 for search '(((bin OR (spinnae OR (spinae OR hainan))) OR line) OR ((ping OR (zheng OR cheng)) OR pin))', query time: 0.20s Refine Results
  1. 1841
  2. 1842
  3. 1843
  4. 1844
  5. 1845

    Kehilangan ayah bukan halangan buat Muhammad Farhad bangkit cemerlang dalam bidang Data Analitik by Siti Nur Azwin, Zulkapri

    Published 2024
    “…Gambang, 26 Oktober 2024 – Muhammad Farhad Bin Khaharruddin, 23, terpegun apabila namanya diumumkan sebagai penerima Anugerah Kecemerlangan Akademik Majlis Ugama Islam dan Adat Resam Melayu Pahang pada Majlis Konvokesyen Ke-19 Universiti Malaysia Pahang (UMPSA). …”
    Get full text
    Newspaper
  6. 1846
  7. 1847
  8. 1848

    Coevolving Cybersecurity Adversaries for Industrial Control Systems in Failure-Prone Environments by Wicks, Kathryn

    Published 2024
    “…In the sub-area that this thesis focuses on, power microgrids, such disturbances can come in the form of line-line faults, line-ground faults, lack of generation capacity to meet demand, and unintentional islanding, among many others. …”
    Get full text
    Thesis
  9. 1849

    Sessile droplet evaporation on patterned surfaces by Ng, Aaron Chin Liang

    Published 2023
    “…For the patterned substrate, a 0º and 45º line of sights are used. Both offer different properties such as hydrophobicity. …”
    Get full text
    Final Year Project (FYP)
  10. 1850

    Computational and experimental study of a platinum thin-film based oil condition and contamination sensor by Sridhar, V, Chana, KS, Singh, D

    Published 2017
    “…The sensor is able to detect any form of contamination in oil and can be used for both off-line and on-line condition monitoring. The sensor is found to be quite sensitive and can detect extremely small concentrations of contaminants of the order 0.01 % by volume. …”
    Conference item
  11. 1851

    Interactive image segmentation by Tsoi, Lok Yin

    Published 2015
    Get full text
    Final Year Project (FYP)
  12. 1852
  13. 1853

    Security enhancement of the communication-efficient AUTHMAC_DH protocols by Lv, Chao, Ma, Maode, Li, Hui, Ma, Jianfeng, Niu, Ben

    Published 2013
    “…In this paper, we first analyze the vulnerability of an AKD protocol under the off-line guessing attack. Then, we propose an enhanced AKD protocol to overcome the vulnerability. …”
    Get full text
    Get full text
    Journal Article
  14. 1854
  15. 1855
  16. 1856
  17. 1857
  18. 1858
  19. 1859
  20. 1860