Showing 121 - 140 results of 360 for search '(((espina OR pin) OR shen) OR (((spans OR (ling OR pings)) OR sssyinga) OR ping))', query time: 0.09s Refine Results
  1. 121
  2. 122

    Bio-fuel-contaminated lubricant and hardening effects on the friction and wear of AISI 1045 steel by Maleque, Md. Abdul, Masjuki, H.H., Ishak, M.

    Published 1998
    “…A study has been made on the wear and fiction of hardened AISI 1045 steel using a pi-pin-ondisc type of fiction and wear apparatus. During the investigation the linear pin wear, coe@cient of friction and rise in pin specimen temperature were monitored and wear and fiction curues 'plotted. …”
    Get full text
    Article
  3. 123

    EFRAG-European Commission Sustainability Standards & ISSB Standard-Setting Process (2022–2024) by Carungu, Jonida, Dimes, Ruth, Molinari, Matteo

    Published 2025
    “…This dataset comprises meeting agendas, detailed discussion papers, summaries, and audio recordings of public webcasts related to the EFRAG-European Commission Sustainability Standards and the International Sustainability Standards Board (ISSB). It spans from the initial standard-setting efforts (March 2022 for EFRAG SRB, July 2022 for ISSB) to November 2024. …”
    Get full text
    Dataset
  4. 124

    Development of switchable planar reflectors for beam shaping realization by Abbasi, Muhammad Inam

    Published 2016
    “…Higher tunable loss factor of 1.91dB was demonstrated by liquid crystal based design as compared to tunable loss factor of 1.43dB shown by PIN diode based design. The investigations were further extended by carrying out equivalent circuit analysis of PIN diode based and liquid crystal based designs for detailed characterization of reconfigurable planar reflector designs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 125

    Characterization of cyclic plasticity type wear mechanism for titanium alloy, TI-6AL-4V on reciprocating sliding wear test by Mohd Harun, Dalila

    Published 2020
    “…Meanwhile for the contact pin, two different diameter cylinders are used i.e Ø6.5 mm and Ø12 mm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 126

    Enrichment of fruit wastes with white rot fungi under submerged state bioconversion by Jamal, Parveen, Saheed, Olorunnisola Kola, Alam, Md. Zahangir, Muyibi, Suleyman Aremu, Abdul Karim, Mohamed Ismail

    Published 2013
    “…On Banana and Pineapple (BPin) the protein content were recorded as18.05 and 15.75 mg/g, which was higher than Papaya and Pineapple (PinPw) and Banana and Papaya (BPw)composite. M6 has 15.4 and 9.78 mg/g on BPinPw, 13.84 and 13.59 mg/g on BPw, 20.82, and 22.97 mg/g on BPin and 18.29 and 11.59 mg/g on PinPw. …”
    Get full text
    Proceeding Paper
  7. 127

    Electrical breakdown and structural characterization in synthetic resins using optical techniques by Dodd, Stephen John

    Published 1992
    “…The early tree growth is shown to be driven by the high electrical field near the pin tip, which is itself dependent on the pin-plane electrode separation as well as the applied voltage. …”
    Get full text
    Thesis
  8. 128
  9. 129
  10. 130

    Development of remote operability CNC milling by ., Afzeri, Muhida, Riza, ., Darmawan

    Published 2010
    “…Attachment consists of three main equipments; material indexing device, Sub clamp with pin and vise index…”
    Get full text
    Proceeding Paper
  11. 131

    The system architecture of E-braille by using the microcontroller and external controller unit by Burhan, Muhammad Mansor, Toha, Siti Fauziah

    Published 2016
    “…This refreshable braille cell can refresh the character. The pin for each braille cell is controlled by using piezoelectric bimorph. …”
    Get full text
    Get full text
    Article
  12. 132
  13. 133

    Evaluation of classifiers in a pressure and latency-based typing biometric system by Moez Khan, Imran, ., Imama, Ushama, K. M., Aibinu, Abiodun Musa, Lai, Weng Kin

    Published 2011
    “…System authentication in present time relies on validation by some sort of a password or Personal Identification Number (PIN). However, if an intruder discovers this password or PIN, the user’s account can be easily compromised. …”
    Get full text
    Proceeding Paper
  14. 134

    An investigation of defect formation and growth in epoxy resin using light scattering methods by Perkins, Elaine Ann

    Published 1989
    “…The later has been attributed to failure occurring at the pin tip epoxy interface causing relaxation in the scattering volume. …”
    Get full text
    Thesis
  15. 135
  16. 136
  17. 137

    Multi-Mode Yagi Uda Patch Array Antenna With Non-Linear Inter-Parasitic Element Spacing by ISA, SITI RAHENA, JUSOH, MUZAMMIL, THENNARASAN SABAPATHY, THENNARASAN SABAPATHY, KAMARUDIN, MUHAMMAD RAMLEE, OSMAN, MOHAMED NASRUN, AKRAM ALOMAINY, AKRAM ALOMAINY

    Published 2023
    “…Applying the inter-parasitic element spacing’s optimization and minimizing the switching circuitry using four RF PIN diodes on the parasitic elements have contributed to the gain achievement of more than 7 dBi.…”
    Get full text
    Article
  18. 138

    A security enhanced timestamp-based password authentication scheme using smart cards by Pathan, Al-Sakib Khan, Hong, Choong Seon

    Published 2007
    “…We show various types of forgery attacks against Shen et al.’s timestamp-based password authentication scheme and improve their scheme to ensure robust security for the remote authentication process, keeping all the advantages of their scheme. …”
    Get full text
    Article
  19. 139

    Development of coated peanut separator and frying skillet machine by Yusof, M Sallehuddin, Fadilullah, M Zul Nadzmi, Hassan, Suhaimi, Maksud, M Idris, Yunos, Muhamad Zaini

    Published 2018
    “…The groundnut is sticking and become like a ping pong size ball and the time consuming to fry is longer. …”
    Get full text
    Article
  20. 140

    Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes by Waqar, Ali, Sang, Jun, Naeem, Hamad, Naeem, Rashid, Soomro, Ali Raza

    Published 2015
    “…As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. …”
    Get full text
    Get full text
    Proceeding Paper