Showing 1,861 - 1,880 results of 6,611 for search '((shinae OR line) OR (((spans OR (pin OR (ping OR (peng OR eng)))) OR (pina OR pinga)) OR ling))', query time: 0.25s Refine Results
  1. 1861
  2. 1862
  3. 1863
  4. 1864
  5. 1865
  6. 1866
  7. 1867
  8. 1868

    Fibre Bragg grating based system for real-time railway monitoring by Li Jing

    Published 2015
    “…FBG sensors, a unique type of optic sensors offer immunity to Electromagnetic Interference, very long distance interrogation, long life-span and multiplexing capacity over conventional electrical sensors so as to meet all the above challenges. …”
    Get full text
    Final Year Project (FYP)
  9. 1869

    Real time power system simulation using Opal-RT by Shi, Donghan

    Published 2015
    “…The power system model consists of generators, power distribution lines, transformers, power electronics converters and loads on both AC and DC buses. …”
    Get full text
    Thesis
  10. 1870

    Sessile droplet evaporation on patterned surfaces by Ng, Aaron Chin Liang

    Published 2023
    “…For the patterned substrate, a 0º and 45º line of sights are used. Both offer different properties such as hydrophobicity. …”
    Get full text
    Final Year Project (FYP)
  11. 1871

    Computational and experimental study of a platinum thin-film based oil condition and contamination sensor by Sridhar, V, Chana, KS, Singh, D

    Published 2017
    “…The sensor is able to detect any form of contamination in oil and can be used for both off-line and on-line condition monitoring. The sensor is found to be quite sensitive and can detect extremely small concentrations of contaminants of the order 0.01 % by volume. …”
    Conference item
  12. 1872
  13. 1873
  14. 1874
  15. 1875
  16. 1876

    Security enhancement of the communication-efficient AUTHMAC_DH protocols by Lv, Chao, Ma, Maode, Li, Hui, Ma, Jianfeng, Niu, Ben

    Published 2013
    “…In this paper, we first analyze the vulnerability of an AKD protocol under the off-line guessing attack. Then, we propose an enhanced AKD protocol to overcome the vulnerability. …”
    Get full text
    Get full text
    Journal Article
  17. 1877
  18. 1878
  19. 1879
  20. 1880