Search alternatives:
shinae » shine (Expand Search), shina (Expand Search), shinde (Expand Search), thinae (Expand Search), chinae (Expand Search), shiae (Expand Search)
shin » thin (Expand Search), chin (Expand Search), shi (Expand Search)
spike » spie (Expand Search)
fine » find (Expand Search), line (Expand Search), five (Expand Search)
aina » ainaa (Expand Search), bina (Expand Search), ain (Expand Search)
anna » ann (Expand Search), anda (Expand Search)
bing » ming (Expand Search), ying (Expand Search), ping (Expand Search)
speng » peng (Expand Search), sheng (Expand Search), spent (Expand Search)
ling » line (Expand Search), link (Expand Search), lin (Expand Search)
shinae » shine (Expand Search), shina (Expand Search), shinde (Expand Search), thinae (Expand Search), chinae (Expand Search), shiae (Expand Search)
shin » thin (Expand Search), chin (Expand Search), shi (Expand Search)
spike » spie (Expand Search)
fine » find (Expand Search), line (Expand Search), five (Expand Search)
aina » ainaa (Expand Search), bina (Expand Search), ain (Expand Search)
anna » ann (Expand Search), anda (Expand Search)
bing » ming (Expand Search), ying (Expand Search), ping (Expand Search)
speng » peng (Expand Search), sheng (Expand Search), spent (Expand Search)
ling » line (Expand Search), link (Expand Search), lin (Expand Search)
-
761
Fouling and mitigation mechanisms during direct microfiltration and ultrafiltration of primary wastewater
Published 2022Get full text
Journal Article -
762
Recent advances and perspectives in aqueous potassium-ion batteries
Published 2022Get full text
Journal Article -
763
Optical atompilz: propagation-invariant strongly longitudinally polarized toroidal pulses
Published 2024Get full text
Journal Article -
764
-
765
Server-aided revocable predicate encryption : formalization and lattice-based instantiation
Published 2021“…The latter, introduced by Katz et al. (2008, EUROCRYPT), provides fine-grained and role-based access to encrypted data and can be viewed as a generalization of identity-based and attribute-based encryption. …”
Get full text
Journal Article -
766
Protectionism in Thailand insurance industry
Published 2010“…Protectionism has been a term long discussed in various fields, especially the trade of goods and services across borders. …”
Get full text
Final Year Project (FYP) -
767
A generic benchmark for power market analysis from generation mix to end-users
Published 2020“…The objective is to develop a platform that can help solving long-term planning problems. The operation described here is the joined day-ahead (DA) clearing for the wholesale market and the individual optimal scheduling of end-users equipped with distributed solar generation and storage. …”
Get full text
Conference Paper -
768
-
769
You must be myths-taken: examining belief in falsehoods during the COVID-19 health crisis
Published 2024“…Instead, a post-COVID-19 landscape will require targeted approaches aimed at vulnerable population sub-groups, that also focus on the erroneous beliefs with long staying power.…”
Get full text
Journal Article -
770
-
771
-
772
-
773
-
774
Rhenium diselenide (ReSe2) near-infrared photodetector : performance enhancement by selective p-doping technique
Published 2020Get full text
Journal Article -
775
Revolutionizing ELISA: a one-step blocking approach using lipid bilayer coatings
Published 2024Get full text
Journal Article -
776
-
777
-
778
-
779
Fully printed flexible smart hybrid hydrogels
Published 2019Get full text
Get full text
Journal Article -
780