Showing 1,621 - 1,640 results of 3,129 for search '(((ping OR (ling OR line)) OR spinge) OR ((((pingk OR pick) OR shinae) OR tingga) OR ming))', query time: 0.20s Refine Results
  1. 1621

    21W.730-2 Expository Writing - Food for Thought: Writing and Reading about Food and Culture, Fall 2005 by Boiko, Karen

    Published 2005
    “…The chef is an artist, yet those who pick oranges or process meat may be little more than slaves. …”
    Get full text
    Learning Object
  2. 1622

    Managing commute traffic : from parking provision with ride-sourcing to work hours arrangements considering household travels by Su, Qida

    Published 2019
    “…Furthermore, in view of the prevailing household travels with multiple trip purposes (e.g., daycare drop-off/pick-up) in peak hours, we incorporate such household travels into the work starting time choice model. …”
    Get full text
    Get full text
    Thesis
  3. 1623
  4. 1624
  5. 1625

    Coevolving Cybersecurity Adversaries for Industrial Control Systems in Failure-Prone Environments by Wicks, Kathryn

    Published 2024
    “…In the sub-area that this thesis focuses on, power microgrids, such disturbances can come in the form of line-line faults, line-ground faults, lack of generation capacity to meet demand, and unintentional islanding, among many others. …”
    Get full text
    Thesis
  6. 1626

    Sessile droplet evaporation on patterned surfaces by Ng, Aaron Chin Liang

    Published 2023
    “…For the patterned substrate, a 0º and 45º line of sights are used. Both offer different properties such as hydrophobicity. …”
    Get full text
    Final Year Project (FYP)
  7. 1627

    Computational and experimental study of a platinum thin-film based oil condition and contamination sensor by Sridhar, V, Chana, KS, Singh, D

    Published 2017
    “…The sensor is able to detect any form of contamination in oil and can be used for both off-line and on-line condition monitoring. The sensor is found to be quite sensitive and can detect extremely small concentrations of contaminants of the order 0.01 % by volume. …”
    Conference item
  8. 1628
  9. 1629
  10. 1630
  11. 1631
  12. 1632

    Security enhancement of the communication-efficient AUTHMAC_DH protocols by Lv, Chao, Ma, Maode, Li, Hui, Ma, Jianfeng, Niu, Ben

    Published 2013
    “…In this paper, we first analyze the vulnerability of an AKD protocol under the off-line guessing attack. Then, we propose an enhanced AKD protocol to overcome the vulnerability. …”
    Get full text
    Get full text
    Journal Article
  13. 1633
  14. 1634
  15. 1635
  16. 1636
  17. 1637
  18. 1638
  19. 1639
  20. 1640