Search alternatives:
sspinna » sskinna (Expand Search)
spin » skin (Expand Search)
Showing 1,341 - 1,360 results of 2,884 for search '(((peng OR ming) OR jingyu) OR (((spie OR line) OR sspinna) OR spin))', query time: 0.16s Refine Results
  1. 1341
  2. 1342
  3. 1343
  4. 1344
  5. 1345

    An exploratory study for a new method to search for heavy neutrinos with data at the Large Hadron Collider (LHC) by Tan, Cherlene Shu Ning

    Published 2020
    “…Till this date, all neutrinos observed are left-handed, rotating clockwise with respect to the direction of motion while the corresponding antineutrinos are right-handed, spinning counterclockwise. However, the fact that neutrinos have mass and spin implies that right handed neutrinos and their corresponding left-handed antineutrinos may exist and have differing properties from their chiral counterparts. …”
    Get full text
    Final Year Project (FYP)
  6. 1346

    The Tampines Cybertimes : from conception to infancy by Goh, Adeline I Ling, Kwek, Amelia Woon, Yang, Jonathan Sun Cheung, Yeo, Jeffrey Wee Teck

    Published 2009
    “…The Tampines CyberTimes started when four students from the School of Communication Studies had a hunch that an on-line community newspaper would pave the way for the future development of journalism in Singapore. …”
    Get full text
    Final Year Project (FYP)
  7. 1347

    Study of arbitrary waveform generation for software defined radio by Luo, Jia Yu.

    Published 2010
    “…It can provide excellent non line of sight (NLOS) coverage while many technologies currently can only provide line of sight coverage. …”
    Get full text
    Final Year Project (FYP)
  8. 1348

    Embedded evolvable fuzzy hardware systems for cell flow scheduling by Li, Ju Hui

    Published 2008
    “…The three major open issues are on-line adaptation, scalability and evolution termination. …”
    Get full text
    Thesis
  9. 1349

    Residual stress testing of weld specimens by Tan, Kailun

    Published 2017
    “…Various NDT tests were conducted both on and along the weld line, as well as corresponding areas away from the weld line and the results were compared. …”
    Get full text
    Final Year Project (FYP)
  10. 1350
  11. 1351

    Real time power system simulation using Opal-RT by Shi, Donghan

    Published 2015
    “…The power system model consists of generators, power distribution lines, transformers, power electronics converters and loads on both AC and DC buses. …”
    Get full text
    Thesis
  12. 1352

    Ultrafast dynamics in quantum materials probed by time-and-momentum-resolved techniques by Su, Yifan

    Published 2024
    “…In this part of the thesis, I will introduce a new pathway for launching coherent acoustic phonons: magnetostriction, and discuss the spin-mediated shear oscillator enabled by this mechanism in van der Waals antiferromagnet. …”
    Get full text
    Thesis
  13. 1353
  14. 1354
  15. 1355

    Coevolving Cybersecurity Adversaries for Industrial Control Systems in Failure-Prone Environments by Wicks, Kathryn

    Published 2024
    “…In the sub-area that this thesis focuses on, power microgrids, such disturbances can come in the form of line-line faults, line-ground faults, lack of generation capacity to meet demand, and unintentional islanding, among many others. …”
    Get full text
    Thesis
  16. 1356

    Sessile droplet evaporation on patterned surfaces by Ng, Aaron Chin Liang

    Published 2023
    “…For the patterned substrate, a 0º and 45º line of sights are used. Both offer different properties such as hydrophobicity. …”
    Get full text
    Final Year Project (FYP)
  17. 1357

    Computational and experimental study of a platinum thin-film based oil condition and contamination sensor by Sridhar, V, Chana, KS, Singh, D

    Published 2017
    “…The sensor is able to detect any form of contamination in oil and can be used for both off-line and on-line condition monitoring. The sensor is found to be quite sensitive and can detect extremely small concentrations of contaminants of the order 0.01 % by volume. …”
    Conference item
  18. 1358
  19. 1359
  20. 1360

    Security enhancement of the communication-efficient AUTHMAC_DH protocols by Lv, Chao, Ma, Maode, Li, Hui, Ma, Jianfeng, Niu, Ben

    Published 2013
    “…In this paper, we first analyze the vulnerability of an AKD protocol under the off-line guessing attack. Then, we propose an enhanced AKD protocol to overcome the vulnerability. …”
    Get full text
    Get full text
    Journal Article