Search alternatives:
spike » spie (Expand Search)
jingge » jingga (Expand Search), jingye (Expand Search), jingle (Expand Search)
ming » min (Expand Search)
ling » long (Expand Search), link (Expand Search), lin (Expand Search)
pingna » pinna (Expand Search), pengna (Expand Search), yingna (Expand Search)
pinn » pin (Expand Search), pina (Expand Search), pink (Expand Search)
ping » peng (Expand Search), ying (Expand Search)
chen » when (Expand Search)
line » like (Expand Search), life (Expand Search)
spike » spie (Expand Search)
jingge » jingga (Expand Search), jingye (Expand Search), jingle (Expand Search)
ming » min (Expand Search)
ling » long (Expand Search), link (Expand Search), lin (Expand Search)
pingna » pinna (Expand Search), pengna (Expand Search), yingna (Expand Search)
pinn » pin (Expand Search), pina (Expand Search), pink (Expand Search)
ping » peng (Expand Search), ying (Expand Search)
chen » when (Expand Search)
line » like (Expand Search), life (Expand Search)
-
201
Integrated marketing communication campaign for Goodwood Park Hotel.
Published 2008Get full text
Final Year Project (FYP) -
202
Adjoint-state traveltime tomography for azimuthally anisotropic media in spherical coordinates
Published 2023Get full text
Journal Article -
203
Establishing two transgenic mouse cell lines for future studies on X chromosome inactivation : a red Xi in live cells and a silenced GFP on the Xi.
Published 2013“…Hence, the aim of this project was to generate two female mouse transgenic cell lines that could be used for studying XCI. In our study, the first cell line was generated using lipo-transfection method. …”
Get full text
Final Year Project (FYP) -
204
Localization and velocity tracking of human via 3 IMU sensors
Published 2016Get full text
Get full text
Journal Article -
205
Applying Frederick Herzberg's motivator-hygiene theory to tourism.
Published 2008Get full text
Final Year Project (FYP) -
206
Exploratory study on how advertising affects credit card usage of young professionals : the case of Singapore.
Published 2008Get full text
Final Year Project (FYP) -
207
-
208
Marketing of iQue Nest : exploratory research in consumers' purchasing behaviour of health tonic products
Published 2008Get full text
Final Year Project (FYP) -
209
Competency-based management in Singapore - an exploratory study.
Published 2008Get full text
Final Year Project (FYP) -
210
Role of inter-departmental relationships in knowledge transfer.
Published 2008Get full text
Final Year Project (FYP) -
211
论明泰昌、天启初年内臣与朝臣的关系 :以宦官王安为例 = The relationship between eunuchs and imperial officials from Ming Tai Chang period to early Tian Qi period : a case study of eunuch Wang An
Published 2021“…最后王安的覆灭也意味着以魏忠贤为首的阉党崛起,失去依靠的东林人士被严厉打击。In the Ming Dynasty, in order for imperial edicts to be promulgated, approval from the Directorate of Ceremonial (司礼监), an eunuch institution, was often needed. …”
Get full text
Final Year Project (FYP) -
212
Design, synthesis, structural characterization, cytotoxicity and computational studies of Usnic acid derivative as potential anti-breast cancer agent against MCF7 and T47D cell lines
Published 2025“…In this study, the usnic acid derivative (UA1) was synthesized due to the effectiveness of usnic acid (UA) against BC cell line. Furthermore, the structure of synthesized compound was determined using FT-IR, 1H NMR, 13C NMR, HSQC, and HMBC spectroscopic techniques. …”
Get full text
Article -
213
-
214
Measurement and calibration of a six-axis reconfigurable parallel robot system
Published 2008Get full text
Research Report -
215
-
216
Implementing control theory on Micro:bit car
Published 2024Subjects: Get full text
Final Year Project (FYP) -
217
-
218
Application of constacyclic codes to quantum MDS codes
Published 2015Get full text
Get full text
Journal Article -
219
Access structures of elliptic secret sharing schemes
Published 2013“…It is a central problem in secret sharing to understand the access structures of secret sharing schemes. In Chen and Kramer, secret sharing schemes from algebraic-geometric codes and their applications in secure multiparty computation were proposed and studied. …”
Get full text
Get full text
Journal Article -
220