Showing 201 - 220 results of 4,154 for search '((pinnae OR (like OR sspingggge)) OR (((shang OR (sheng OR cheng)) OR (bina OR bing)) OR pin))', query time: 0.22s Refine Results
  1. 201
  2. 202
  3. 203
  4. 204
  5. 205
  6. 206
  7. 207
  8. 208
  9. 209
  10. 210
  11. 211

    A (biological) enemy of the people by Shang, Lijun, Dando, Malcolm

    Published 2024
    “…Professor Lijun Shang, Director of Biological Security Research Center (BSRC) at London Metropolitan University (LMU) and Professor Malcolm Dando of Bradford University, also visiting Professor to BSRC LMU, talk to Gwyn Winfield about setting up their International Biosecurity Education Network (IBSEN)…”
    Get full text
    Get full text
    Article
  12. 212
  13. 213
  14. 214

    Mesoporous Co3O4 and CoO@C topotactically transformed from chrysanthemum-like Co(CO3)0.5(OH)·0.11H2O and their lithium-storage properties by Xiong, Shenglin, Chen, Jun Song, Lou, David Xiong Wen, Zeng, Hua Chun

    Published 2012
    “…In this method, sodium chloride salt is utilized to organize single-crystalline nanowires into a chrysanthemum-like hierarchical assembly. The morphological evolution process of this organized product is investigated by examining different reaction intermediates during the synthesis. …”
    Get full text
    Get full text
    Journal Article
  15. 215

    Phase measurements based indoor visible light positioning systems by Zhang, Sheng

    Published 2020
    “…Applications of LEDs in indoor communications have been gradually investigated in the last two decades. Companies like Pure-LiFi and Oledcomm (with the product Li-Fi MAX and MyLiFi bidirectional desk lamp), as well as many research institutes, are researching on the secure and high-speed visible light-based communication approach with good adaptivity. …”
    Get full text
    Thesis-Doctor of Philosophy
  16. 216

    On the privacy protection of fingerprint templates by Li, Sheng.

    Published 2013
    “…Once the template is stolen, it is difficult to be replaced like passwords and the private personal information associated with the stolen template would also be exposed. …”
    Get full text
    Thesis
  17. 217
  18. 218
  19. 219
  20. 220