Showing 1,381 - 1,400 results of 8,058 for search '((pinna OR (find OR (spine OR (shinae OR shina)))) OR (ping OR ((ming OR link) OR min)))', query time: 0.24s Refine Results
  1. 1381

    PEIGEN – a platform for evaluation, implementation, and generation of S-boxes by Sasaki, Yu, Ling, San, Guo, Jian, Bao, Zhenzhen

    Published 2019
    “…In this paper, a platform named PEIGEN is presented to evaluate security, find efficient software/hardware implementations, and generate cryptographic S-boxes. …”
    Get full text
    Get full text
    Journal Article
  2. 1382
  3. 1383

    Gum Arabic and breast cancer biology: Biotechnology perspective

    Published 2025
    “…Researchers in the fields of biotechnology, oncology, and natural product chemistry find this book invaluable. Whether you are exploring new frontiers in cancer treatment or a practitioner seeking novel therapeutic approaches, this book provides critical insights into innovative strategies for combating breast cancer. …”
    Get full text
    Get full text
    Edited book
  4. 1384

    Optimizing resource allocation in large communications satellite constellations by Pachler de la Osa, Nils

    Published 2024
    “…By testing existing designs, it is concluded that the number of satellites, as well as the link quality are the main drivers of performance. …”
    Get full text
    Thesis
  5. 1385

    TPPP acts downstream of RhoA-ROCK-LIMK2 to regulate astral microtubule organization and spindle orientation by Heng, Yi-Wen., Lim, Hong-Hwa., Mina, Theresia., Utomo, Prayudi., Zhong, Shaoping., Lim, Chwee-Teck., Koh, Cheng-Gee

    Published 2014
    “…Thus, our results reveal a new regulatory link between the actin cytoskeleton and the mitotic spindle during the early stages of mitosis.…”
    Get full text
    Get full text
    Journal Article
  6. 1386

    Small sample sizes reduce the replicability of task-based fMRI studies by Turner, Benjamin O., Paul, Erick J., Miller, Michael B., Barbey, Aron K.

    Published 2020
    “…Using large independent samples across eleven tasks, we demonstrate the impact of sample size on replicability, assessed at different levels of analysis relevant to fMRI researchers. We find that the degree of replicability for typical sample sizes is modest and that sample sizes much larger than typical (e.g., N = 100) produce results that fall well short of perfectly replicable. …”
    Get full text
    Journal Article
  7. 1387
  8. 1388

    Exploring of cellulose nanocrystals from lignocellulosic sources as a powerful adsorbent for wastewater remediation by Norfarhana, A. S., Khoo, P. S., Ilyas, R. A., Ab Hamid, N. H., Aisyah, H. A., Norrrahim, Mohd Nor Faiz, Knight, V. F., Rani, M. S. A., Septevani, Athanasia Amanda, Syafri, Edi, Annamalai, Pratheep K.

    Published 2024
    “…As research and development in this field progress, CNC-based adsorbents are expected to become even more effective and find expanded applications in combating water pollution.…”
    Article
  9. 1389
  10. 1390

    Development of LCD/SLM driver IC/FPGA by Tan, John Chin Liang

    Published 2015
    “…In this report, the project is based on a platform that is capable of interfacing the information transmitted from a personal computer and Field Programmable Gate Array (FPGA) via Universal Serial Bus (USB) link and it is to be displayed on a LCD display screen. …”
    Get full text
    Final Year Project (FYP)
  11. 1391

    Dynamic control of APD optical detector for SONET receiver application by Fernandes, Brain Sunil Nicholas

    Published 2008
    “…The functionality of the communication link is monitored using Digital Communication Equipment, so as to ensure the operation of the controller over the entire range of the link application.…”
    Get full text
    Thesis
  12. 1392
  13. 1393
  14. 1394

    Efficient public key encryption with equality test in the standard model by Zhang, Kai, Chen, Jie, Lee, Hyung Tae, Qian, Haifeng, Wang, Huaxiong

    Published 2020
    “…Then, to prevent adaptive chosen ciphertext attacks (CCA2), we give a link between them by adapting the technique which was originally proposed for identity-based encryption and previously exploited to design efficient CCA2-secure PKE schemes. …”
    Get full text
    Journal Article
  15. 1395
  16. 1396
  17. 1397
  18. 1398
  19. 1399
  20. 1400