Search alternatives:
pinka » pink (Expand Search), pinna (Expand Search), linka (Expand Search)
line » like (Expand Search), life (Expand Search)
finned » financed (Expand Search)
pined » opined (Expand Search), pineda (Expand Search), pinedo (Expand Search)
pinned » pinged (Expand Search), pined (Expand Search), pinked (Expand Search)
pinn » ping (Expand Search), pin (Expand Search), pink (Expand Search)
pina » ping (Expand Search), pin (Expand Search), aina (Expand Search)
bina » bin (Expand Search), bing (Expand Search)
ling » long (Expand Search), link (Expand Search), lin (Expand Search)
pinka » pink (Expand Search), pinna (Expand Search), linka (Expand Search)
line » like (Expand Search), life (Expand Search)
finned » financed (Expand Search)
pined » opined (Expand Search), pineda (Expand Search), pinedo (Expand Search)
pinned » pinged (Expand Search), pined (Expand Search), pinked (Expand Search)
pinn » ping (Expand Search), pin (Expand Search), pink (Expand Search)
pina » ping (Expand Search), pin (Expand Search), aina (Expand Search)
bina » bin (Expand Search), bing (Expand Search)
ling » long (Expand Search), link (Expand Search), lin (Expand Search)
-
921
Integrated patient monitoring system
Published 2013“…The four displays were: Numeric Display, Polygon with Line Trend, Parallel Coordinate with Line Trend and finally Parallel Coordinate with Dot Trend. …”
Get full text
Final Year Project (FYP) -
922
Aspectual classification of mandarin Chinese verbs : a perspective of scale structure
Published 2014Get full text
Get full text
Get full text
Journal Article -
923
3D simulation-based research on the effect of interconnect structures on circuit reliability
Published 2015“…The simulation of the EM reliability of the interconnects is usually performed using the line-via structure at the EM test temperature (e.g. 300 oC).However, such simulation using the line-via structure may not give the same void nucleation location as in the real circuit structure, especially at the circuit operation temperature (e.g. 90C). …”
Get full text
Get full text
Get full text
Journal Article -
924
Study of arbitrary waveform generation for software defined radio
Published 2010“…It can provide excellent non line of sight (NLOS) coverage while many technologies currently can only provide line of sight coverage. …”
Get full text
Final Year Project (FYP) -
925
Embedded evolvable fuzzy hardware systems for cell flow scheduling
Published 2008“…The three major open issues are on-line adaptation, scalability and evolution termination. …”
Get full text
Thesis -
926
Residual stress testing of weld specimens
Published 2017“…Various NDT tests were conducted both on and along the weld line, as well as corresponding areas away from the weld line and the results were compared. …”
Get full text
Final Year Project (FYP) -
927
-
928
Coevolving Cybersecurity Adversaries for Industrial Control Systems in Failure-Prone Environments
Published 2024“…In the sub-area that this thesis focuses on, power microgrids, such disturbances can come in the form of line-line faults, line-ground faults, lack of generation capacity to meet demand, and unintentional islanding, among many others. …”
Get full text
Thesis -
929
Sessile droplet evaporation on patterned surfaces
Published 2023“…For the patterned substrate, a 0º and 45º line of sights are used. Both offer different properties such as hydrophobicity. …”
Get full text
Final Year Project (FYP) -
930
Computational and experimental study of a platinum thin-film based oil condition and contamination sensor
Published 2017“…The sensor is able to detect any form of contamination in oil and can be used for both off-line and on-line condition monitoring. The sensor is found to be quite sensitive and can detect extremely small concentrations of contaminants of the order 0.01 % by volume. …”
Conference item -
931
-
932
-
933
Economic Nonlinear Model Predictive Control of Continuous Viral Bioreactors
Published 2024Get full text
Article -
934
The quad's public goods approach: countering the BRI
Published 2023Get full text
Get full text
Commentary -
935
Security enhancement of the communication-efficient AUTHMAC_DH protocols
Published 2013“…In this paper, we first analyze the vulnerability of an AKD protocol under the off-line guessing attack. Then, we propose an enhanced AKD protocol to overcome the vulnerability. …”
Get full text
Get full text
Journal Article -
936
Tumor cell-intrinsic signals promoting tolerance and adaptation to oncogenic kinase inhibition
Published 2024“…Using commonly prescribed TK inhibitors (TKIs), I show that TK genetic status generally predicts whether or not a cell line will show any response to genotype-matched TKI (GM-TKI), but is insufficient to predict drug tolerance, the ability of a cell line to sustain proliferation under drug. …”
Get full text
Get full text
Thesis -
937
-
938
-
939
Foreign direct investment in Mongolia : bridging the cultural divide
Published 2014Get full text
Thesis -
940
NEGOTIATE your way to RICHES /
Published 2003“…And just as important, it will show you how to go about "convincing others to give you what you want." BOTTOM LINE: if you buy or sell anything personally or professionally, this book can make or save you a fortune!.…”
text