Showing 661 - 680 results of 6,119 for search '((spinae OR (like OR (pinned OR pinedo))) OR ((yong OR yang) OR ling))', query time: 0.17s Refine Results
  1. 661
  2. 662

    NiNC Catalysts in CO2-to-CO Electrolysis by Zhang, Hao, Qi, Menghui, Wang, Yong

    Published 2025
    “…Recent study by Strasser et al. in Nature Chemical Engineering presents a high-performance CO2-to-CO electrolyzer utilizing a NiNC catalyst with nearly 100% faradaic efficiency, employing innovative diagnostic tools like the carbon crossover coefficient (CCC) to address transport-related failures and optimize overall efficiency. …”
    Get full text
    Article
  3. 663
  4. 664

    Wear behaviour of martensitic NiTi shape memory alloy under ball-on-disk sliding tests by Yan, Lina, Liu, Yong, Liu, Erjia

    Published 2013
    “…A special wear feature, herein referred to as the “crown-like structure”, was produced under near-zero and transition wear conditions and was observed for the first time in this study. …”
    Get full text
    Get full text
    Journal Article
  5. 665
  6. 666

    书写马共历史 :以金枝芒、黄锦树、廖克发为例 = Narrating the history of Malayan Communist Party : a case study of Jin Zhi Mang, Ng Kim Chew, and Lau Kek Huat by 杨量而 Yong, Liang Yi

    Published 2018
    “…On the other hand, inevitably like all history narration, there are several contradictions in the “small history”, thus providing us different point of view from the insider, outsider and from the next generation of MCP. …”
    Get full text
    Final Year Project (FYP)
  7. 667

    Audio watermarking by Ho, Shuet Mun, Ng, Ling Mei

    Published 2015
    “…Results show successful recovery of the signature which allows conclusive authentication of the owner even after attacks like filtering, cropping, MPEG compression, resampling and the addition of noise.…”
    Get full text
    Final Year Project (FYP)
  8. 668
  9. 669
  10. 670
  11. 671
  12. 672
  13. 673
  14. 674
  15. 675
  16. 676
  17. 677
  18. 678

    Analysis of improved side-channel attack on AES-128 with masking by Tee, Yee Yang

    Published 2020
    “…Today, many embedded processors like smart cards are used to store to secret keys, and these are vulnerable to cyber-physical attacks like Side Channel Attack (SCA). …”
    Get full text
    Final Year Project (FYP)
  19. 679

    Study of wireless body area network by Xuan, Zhi Yang.

    Published 2010
    “…However, there are some issues related to the energy of this wearable system, like inconvenience of changing battery. Therefore, developing energy efficient WBAN system is also a hot research topic. …”
    Get full text
    Final Year Project (FYP)
  20. 680