Showing 2,101 - 2,120 results of 7,196 for search '(((pina OR ((line OR life) OR (shinde OR shine))) OR like) OR (spins OR (ping OR ling)))', query time: 0.23s Refine Results
  1. 2101
  2. 2102
  3. 2103
  4. 2104
  5. 2105

    Coevolving Cybersecurity Adversaries for Industrial Control Systems in Failure-Prone Environments by Wicks, Kathryn

    Published 2024
    “…In the sub-area that this thesis focuses on, power microgrids, such disturbances can come in the form of line-line faults, line-ground faults, lack of generation capacity to meet demand, and unintentional islanding, among many others. …”
    Get full text
    Thesis
  6. 2106

    Sessile droplet evaporation on patterned surfaces by Ng, Aaron Chin Liang

    Published 2023
    “…For the patterned substrate, a 0º and 45º line of sights are used. Both offer different properties such as hydrophobicity. …”
    Get full text
    Final Year Project (FYP)
  7. 2107

    Computational and experimental study of a platinum thin-film based oil condition and contamination sensor by Sridhar, V, Chana, KS, Singh, D

    Published 2017
    “…The sensor is able to detect any form of contamination in oil and can be used for both off-line and on-line condition monitoring. The sensor is found to be quite sensitive and can detect extremely small concentrations of contaminants of the order 0.01 % by volume. …”
    Conference item
  8. 2108
  9. 2109
  10. 2110

    Jannah : Home at Last / by Suleiman, Omar, author 656097, Kube Publishing Limited (Online Service) 656100

    Published 2024
    “…Whatever our situation may be in this life, a life of struggle or comfort, our inevitable fate is the same as the life of this world is temporary. …”
    Get full text
    software, multimedia
  11. 2111

    Lebensphilosophie in Rabbi Avraham Itzhak HaCohen Kook’s thought: the case of Henri Bergson by Amati, G

    Published 2024
    “…Lebensphilosophie emphasizes the concept of life, stressing the connection between human beings, nature, and the flow of life. …”
    Thesis
  12. 2112
  13. 2113

    Security enhancement of the communication-efficient AUTHMAC_DH protocols by Lv, Chao, Ma, Maode, Li, Hui, Ma, Jianfeng, Niu, Ben

    Published 2013
    “…In this paper, we first analyze the vulnerability of an AKD protocol under the off-line guessing attack. Then, we propose an enhanced AKD protocol to overcome the vulnerability. …”
    Get full text
    Get full text
    Journal Article
  14. 2114
  15. 2115
  16. 2116
  17. 2117
  18. 2118
  19. 2119
  20. 2120