Search alternatives:
ainaae » ainaa (Expand Search)
Showing 641 - 660 results of 2,044 for search '(((pinnae OR ainaae) OR ((pick OR ping) OR pineda)) OR (pina OR line))', query time: 0.15s Refine Results
  1. 641
  2. 642
  3. 643
  4. 644
  5. 645
  6. 646

    21W.730-2 Expository Writing - Food for Thought: Writing and Reading about Food and Culture, Fall 2005 by Boiko, Karen

    Published 2005
    “…The chef is an artist, yet those who pick oranges or process meat may be little more than slaves. …”
    Get full text
    Learning Object
  7. 647

    Managing commute traffic : from parking provision with ride-sourcing to work hours arrangements considering household travels by Su, Qida

    Published 2019
    “…Furthermore, in view of the prevailing household travels with multiple trip purposes (e.g., daycare drop-off/pick-up) in peak hours, we incorporate such household travels into the work starting time choice model. …”
    Get full text
    Get full text
    Thesis
  8. 648

    Coevolving Cybersecurity Adversaries for Industrial Control Systems in Failure-Prone Environments by Wicks, Kathryn

    Published 2024
    “…In the sub-area that this thesis focuses on, power microgrids, such disturbances can come in the form of line-line faults, line-ground faults, lack of generation capacity to meet demand, and unintentional islanding, among many others. …”
    Get full text
    Thesis
  9. 649

    Sessile droplet evaporation on patterned surfaces by Ng, Aaron Chin Liang

    Published 2023
    “…For the patterned substrate, a 0º and 45º line of sights are used. Both offer different properties such as hydrophobicity. …”
    Get full text
    Final Year Project (FYP)
  10. 650

    Computational and experimental study of a platinum thin-film based oil condition and contamination sensor by Sridhar, V, Chana, KS, Singh, D

    Published 2017
    “…The sensor is able to detect any form of contamination in oil and can be used for both off-line and on-line condition monitoring. The sensor is found to be quite sensitive and can detect extremely small concentrations of contaminants of the order 0.01 % by volume. …”
    Conference item
  11. 651
  12. 652
  13. 653

    Security enhancement of the communication-efficient AUTHMAC_DH protocols by Lv, Chao, Ma, Maode, Li, Hui, Ma, Jianfeng, Niu, Ben

    Published 2013
    “…In this paper, we first analyze the vulnerability of an AKD protocol under the off-line guessing attack. Then, we propose an enhanced AKD protocol to overcome the vulnerability. …”
    Get full text
    Get full text
    Journal Article
  14. 654
  15. 655
  16. 656
  17. 657
  18. 658
  19. 659
  20. 660