Showing 61 - 80 results of 11,523 for search '(((pin OR ping) OR five) OR ((((gaina OR gain) OR anna) OR (sheng OR ningbo)) OR ming))', query time: 0.12s Refine Results
  1. 61

    Culture of five species of Malaysia indigenous freshwater microalgae by Sallehudin, Nor Jannah, Mustapa, Mokhzanni, Mel , Maizirwan, Ahmad Raus, Raha

    Published 2016
    “…Five species of Malaysia indigenous chlorophycean microalgae were grown in laboratory culture under the comparable environmental condition and the population doubling time (td) as well as maximum growth rate (μmax) each was evaluated. …”
    Get full text
    Proceeding Paper
  2. 62

    High voltage gain DC-DC converter using interleaved switching technique with PWM for current stress by Abd Samat, Mohd Nasri

    Published 2019
    “…This project proposed a high voltage gain DC-DC converter with high boost ratio by using Interleaved switching technique in order to reduce the inductance of inductor required in the proposed converter circuit structure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 63

    High-gain metasurface in polyimide on-chip antenna based on CRLH-TL for sub-terahertz integrated circuits by Alibakhshikenari, Mohammad, Virdee, Bal Singh, See, Chan, Abd-Alhameed, Raed, Falcone, Francisco, Limiti, Ernesto

    Published 2020
    “…The overall structure behaves like a metasurface that is shown to exhibit a very large bandwidth of 0.350-0.385THz with an average radiation gain and efficiency of 8.15dBi and 65.71%, respectively. …”
    Get full text
    Get full text
    Article
  4. 64

    Reconsidering the need for gain-of­ function research on enhanced potential pandemic pathogens in the post-COVID-19 era by Shinomiya, Nariyoshi, Minari, Jusaku, Yoshizawa, Go, Dando, Malcolm, Shang, Lijun

    Published 2022
    “…The dual-use risk of infectious disease research using enhanced potential pandemic pathogens (ePPP), particularly gain-of-function (GOF) research, has been debated since 2011. …”
    Get full text
    Article
  5. 65
  6. 66
  7. 67

    Achieving security for images by LSB and MD5 by Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, O. Alhussainan, Sondos

    Published 2012
    “…This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. …”
    Get full text
    Article
  8. 68
  9. 69
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74
  15. 75
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80