Search alternatives:
chen » when (Expand Search)
bees » bee (Expand Search), sees (Expand Search), beds (Expand Search)
fees » fee (Expand Search), feed (Expand Search), feel (Expand Search)
feeds » needs (Expand Search), feed (Expand Search), seeds (Expand Search)
chen » when (Expand Search)
bees » bee (Expand Search), sees (Expand Search), beds (Expand Search)
fees » fee (Expand Search), feed (Expand Search), feel (Expand Search)
feeds » needs (Expand Search), feed (Expand Search), seeds (Expand Search)
-
241
-
242
-
243
Anti-inflammatory and radical scavenging activities of Tualang honey and its ethyl acetate fractions /
Published 2018software, multimedia -
244
Comparative analysis of Internet service providers' competition and Internet usage pattern.
Published 2008Get full text
Final Year Project (FYP) -
245
Application of machine learning in 3D bioprinting: focus on development of big data and digital twin
Published 2022Get full text
Journal Article -
246
Study of the characteristics of a total knee replacement prosthesis
Published 2008Get full text
Research Report -
247
-
248
-
249
Practical support structures for selective laser melting
Published 2018Get full text
Get full text
Journal Article -
250
Influence of spatial variability on slope failure analysis by the shear strength reduction technique
Published 2012Get full text
Get full text
Get full text
Conference Paper -
251
Microstructure evolution and mechanical property response via 3D printing parameter development of Al–Sc alloy
Published 2021Get full text
Journal Article -
252
Classifying vulnerability to sleep deprivation using baseline measures of psychomotor vigilance
Published 2015“…Citation: Patanaik A, Kwoh CK, Chua EC, Gooley JJ, Chee MW. Classifying vulnerability to sleep deprivation using baseline measures of psychomotor vigilance. …”
Get full text
Get full text
Journal Article -
253
Practical attribute reconstruction attack against federated learning
Published 2024“…Existing federated learning (FL) designs have been shown to exhibit vulnerabilities which can be exploited by adversaries to compromise data privacy. …”
Get full text
Journal Article -
254
-
255
Additive Manufacturing for Active Electronic Components: A Review
Published 2016“…Fabrication of fully functional devices has been one of the ultimate goals of the emerging additive manufacturing technology. …”
Get full text
Get full text
Conference Paper -
256
The potential mechanisms of tissue flossing with Flossband application around the joints or soft tissues: A theoretical framework
Published 2024“…Flossband application in rehabilitation and sports medicine has been demonstrated to increase flexibility, improve muscle strength, dampen pain, and reduce inflammation. …”
Get full text
Article -
257
Accuracy of second order perturbation theory in the polaron and variational polaron frames
Published 2013Get full text
Get full text
Journal Article -
258
Fault-tolerant computation meets network coding: optimal scheduling in parallel computing
Published 2023Get full text
Journal Article -
259
Performance evaluation and implementation of voice and data over the local area network
Published 2008Get full text
Research Report -
260