Search alternatives:
els » gels (Expand Search), elms (Expand Search), elsa (Expand Search)
else » gelse (Expand Search), elmse (Expand Search), elsae (Expand Search), ease (Expand Search)
mella » bella (Expand Search), molla (Expand Search), nella (Expand Search), mbella (Expand Search), mplla (Expand Search), melsa (Expand Search)
mello » bello (Expand Search), hello (Expand Search)
della » delta (Expand Search), dell (Expand Search), dbella (Expand Search), dplla (Expand Search), delsa (Expand Search)
mbbella » mbella (Expand Search), umbrella (Expand Search), mbbbella (Expand Search), mbbplla (Expand Search), mbbelsa (Expand Search)
ella » bella (Expand Search), plla (Expand Search), elsa (Expand Search)
els » gels (Expand Search), elms (Expand Search), elsa (Expand Search)
else » gelse (Expand Search), elmse (Expand Search), elsae (Expand Search), ease (Expand Search)
mella » bella (Expand Search), molla (Expand Search), nella (Expand Search), mbella (Expand Search), mplla (Expand Search), melsa (Expand Search)
mello » bello (Expand Search), hello (Expand Search)
della » delta (Expand Search), dell (Expand Search), dbella (Expand Search), dplla (Expand Search), delsa (Expand Search)
mbbella » mbella (Expand Search), umbrella (Expand Search), mbbbella (Expand Search), mbbplla (Expand Search), mbbelsa (Expand Search)
ella » bella (Expand Search), plla (Expand Search), elsa (Expand Search)
-
161
-
162
Bella's empowerment - why the twilight saga is not anti-feminist.
Published 2013“…Rowling and the Fifty Shades of Grey trilogy by E.L. James that have taken the contemporary literary scene by storm, no other novels can arguably match up to the success of Stephenie Meyer’s Twilight series. …”
Get full text
Final Year Project (FYP) -
163
-
164
Information encryption processing over wireless LAN
Published 2013“…The SecureCommunication2.0 and Mobile-Robot Tracking System include different types of encryption technologies such as Digital Encryption Standard (DES), Diffie-Hellman Public Key Algorithm, ElGamal algorithms, Message Digests and Digital Signatures. …”
Get full text
Final Year Project (FYP) -
165
-
166
-
167
Numerical simulation of a forced circulation solar water heating system
Published 2024Get full text
Article -
168
Machine learning, IoT and 5G technologies for breast cancer studies: A review
Published 2024Get full text
Article -
169
-
170
Blockchain and FL-based secure architecture for enhanced external Intrusion detection in smart farming
Published 2025“…Our architecture employs Ensemble Learning (EL) for the Local Model at the Ensemble Layer to train each Smart Land's data and offers privacy-prevented security. …”
Get full text
Article -
171
-
172
Cache refinement type for side-channel detection of cryptographic software
Published 2023“…We evaluate CaType in identifying side channel vulnerabilities in real-world crypto software, including RSA, ElGamal, and (EC)DSA from OpenSSL and Libgcrypt. …”
Get full text
Conference Paper -
173
Rethinking small-footprint counter-terrorism: moving from kinetic operations to security force assistance
Published 2015“…Drawing on the experiences of U.S. advisory efforts in El Salvador and the Philippines, this paper demonstrates that a counter-terrorism strategy centred on Security Force Assistance holds far more potential than the current enemy-centric policy. …”
Get full text
Thesis -
174
Characterizing the Life Cycle of Online News StoriesUsing Social Media Reactions
Published 2020Get full text
Presentation -
175
3–10 GHz self-biased resistive-feedback LNA with inductive source degeneration
Published 2013Get full text
Get full text
Journal Article -
176
Choice of DLVO approximation method for quantifying the affinity between latex particles and membranes
Published 2023“…In particular, while both the Poisson-Boltzmann (P–B) and linear superposition approximation (LSA) equations can quantify the electrostatics (EL) interaction energy component, the former assumes constant potential, while the latter additionally considers constant charge scenarios. …”
Get full text
Journal Article -
177
Material characterization of additive manufactured metal parts for failure analysis
Published 2019“…The samples are tested for its mechanical properties via tensile testing, there are differences in mechanical performance such as YS, UTS, EL, ROA is observed. This resulted in the differences of microstructural defects, fractography and porosity analysis using Scanning Electron Microscope (SEM) and Optical Microscope (OM). …”
Get full text
Final Year Project (FYP) -
178
-
179
Animation of electronic and optical processes in semiconductors
Published 2009“…Many websites and schools such as University of Colorado, Department of Electrical and Computer Engineering [1] and University of Texas at El Paso, Department of electrical and computer engineering [2], have their own version of animation to help in the explanation of semiconductor fundamental. …”
Get full text
Final Year Project (FYP) -
180
On the distributional forecasting of UK economic growth with generalised additive models for location scale and shape (GAMLSS)
Published 2025“…It consists of eleven variables, which include economic growth (Econ), consumer price index (CPI), inflation (Infl), manufacturing (Manuf), electricity and gas (ElGas), construction (Const), industries (Ind), wholesale and retail (WRet), real estate (REst), education (Edu) and health (Health). …”
Get full text
Article