Showing 241 - 260 results of 7,291 for search '((spinae OR find) OR (((zheng OR link) OR (spike OR (swing OR shing))) OR ping))', query time: 0.19s Refine Results
  1. 241

    Three essays on gender wage differentials by Fang, Zheng

    Published 2012
    “…The objectives of the first chapter of the thesis are to expand the body of evidence, providing an international update from more than 50 countries in 5 continents and to suggest potential explanations to the stylized facts documented across countries. We find that glass ceilings are present in 22 European countries, while no country in Asia but Kazakhstan and Uzbekistan show evidence of glass ceilings. …”
    Get full text
    Thesis
  2. 242

    Adder and multiplier design for computing-in-memory architecture based on ReRAM by Zheng, Buyun

    Published 2023
    “…We live in an era where the semiconductor and computer industries are developing rapidly. It can find that these two industries are mutually reinforcing. …”
    Get full text
    Thesis-Master by Coursework
  3. 243

    Energy-efficient video streaming over wireless networks by Chuah, Seong Ping

    Published 2013
    “…Meanwhile, datarate capacity of wireless links increases exponentially as wireless radio technology evolves from 2G to 4G. …”
    Get full text
    Thesis
  4. 244

    Simulations study of fluid-structure interaction of a wind turbine by Zheng, Shuai

    Published 2018
    “…The motivation of the current investigation is to address the FSI problem of HAWT in the whole flow field analysis with hybrid turbulence model method which is used to find out the flow and structure characteristics of wind turbine in operation under different tip speed ratio (TSR). …”
    Get full text
    Get full text
    Thesis
  5. 245

    Discrete geodesic graphs by Fang, Zheng

    Published 2019
    “…The discrete geodesic problem aims to find the shortest path and distance between arbitrary points on discrete surfaces. …”
    Get full text
    Get full text
    Thesis
  6. 246

    Physical unclonable function based solutions to unification of user, device and data authentication by Zheng, Yue

    Published 2020
    “…The non-repudiation assumption of these conventional techniques is being challenged by emerging artificial-intelligent assisted and malware-based attacks on independently chained weak links (factors), and their limited extension to IoT scenarios, where the sheer number of inexpensive and often insufficiently protected endpoints prevent application of standard, secret-key based techniques. …”
    Get full text
    Thesis-Doctor of Philosophy
  7. 247
  8. 248
  9. 249
  10. 250
  11. 251
  12. 252
  13. 253
  14. 254
  15. 255
  16. 256
  17. 257
  18. 258
  19. 259
  20. 260