-
141
Design analysis of data links in 2.5 dics
Published 2015“…Individual known good dies connected in 3D fashion gives poor yields and get discarded if the integrated IC fails. 2.5DICs allow interconnection of multiple chips on the same Si substrate placed side to side with interconnections made using Si interposer with multiple metal layers. …”
Get full text
Thesis -
142
Measurements of a 5:1 blood pump model
Published 2017“…The angular positions are at intervals of 5 degrees for each measurement. The hot wire probe will also mounted at 3 different protrusion depths which are 0.25mm, 0.5mm, 0.75mm from the wall of the pump casing. …”
Get full text
Final Year Project (FYP) -
143
Seroprevalence of SARS-CoV-2 in children and adolescents
Published 2023“…<p>COVID-19 disease (COVID-19) caused by Severe Acute Respiratory Syndrome Coronavirus -2 (SARS-CoV-2) first emerged in December 2019 in Wuhan, China. …”
Thesis -
144
Primary five pupils' computational estimation skills and related mathematical abilities
Published 2009“…This study sought to investigate the relationships between problem-solving ability, mental-calculation ability and computational-estimation ability of primary 5 pupils. It also attempted to examine the strategies used by good student-estimators in solving computational-estimation problems.…”
Get full text
Thesis -
145
A review of offshore decommissioning regulations in five countries – strengths and weaknesses
Published 2019Get full text
Get full text
Journal Article -
146
The role of the five power defence arrangements in the Southeast Asian security architecture
Published 2011“…This paper discusses the evolving Southeast Asian security architecture by focusing on the role of a “mini-lateral” defence coalition, the Five Power Defence Arrangements (FPDA). …”
Get full text
Get full text
Working Paper -
147
Improving Integrity Halal Supplier in Food Supply Chain: Scoping Review
Published 2024“…A total of 13 journal articles were identified for a full review. Result: Five themes were found from the literature relevant to food supply chain integrity through halal supplier. …”
Get full text
Article -
148
A probabilistic risk modelling chain for analysis of regional flood events
Published 2021“…A probabilistic flood risk modelling chain is proposed for flood risk analysis with consideration of spatial spreading and temporal clustering of the flood events. …”
Get full text
Journal Article -
149
Study on supply chain challenges in container shipping : the port operator's perspectice
Published 2009“…The role of the port operator in this globalized era increased significantly with the development of global supply chains. The objective of the report is to identify how current issues and challenges faced by ports will affect overall port operator’s productivity and performance, followed by provision of recommendations on how port operators can deal with these challenges. …”
Get full text
Final Year Project (FYP) -
150
Battery Blueprint: Saudi Arabia’s Strategic Foray into the Battery Value Chain
Published 2024“…Key enablers such as Saudi Arabia’s commitment to renewable energy and industrial growth in adjacent sectors, including automotive and refinery, provide a foundation for entry into the battery value chain. However, the Kingdom must navigate barriers such as market competition and the need for technological expertise in advanced battery production, a market led by heavyweights like China and innovators across the globe. …”
Get full text
Thesis -
151
From Hurdles to Highways: Overcoming Barriers to Robotics Adoption in Supply Chains
Published 2024“…Focused on these challenges and strategic issues for warehouse applications, this thesis investigates the obstacles to implementing robotic automation in supply chains. The thesis explores this environment and the lens of using three common integration methods. …”
Get full text
Thesis -
152
How J-chain ensures the assembly of immunoglobulin IgM pentamers
Published 2024“…They are produced either as assemblies of six µ2L2 subunits (i.e., hexamers), or as pentamers of two µ2L2 subunits and an additional protein termed J-chain (JC), which allows transcytosis across epithelia. …”
Get full text
Article -
153
-
154
-
155
Multi-chain energy trading In blockchain-based microgrids with notary schemes
Published 2024Get full text
Final Year Project (FYP) -
156
Food security beyond borders: securing ASEAN's food supply chains
Published 2024“…A shift is needed going beyond the traditional focus on country-level food security towards a truly integrated regional approach based on interlinked food supply chain security.…”
Get full text
Commentary -
157
Work-life balance issues in supply chain management organisations in Singapore.
Published 2010“…This study has extended previous Work-Life balance research by bringing focus to the Supply Chain Management (SCM) industry in Singapore. Quantitative survey data were obtained from a sample of 271 employees of different levels in the various SCM organisations. …”
Get full text
Final Year Project (FYP) -
158
Co-ordinated supply chain modelling and model-based performance evaluation
Published 2008Subjects: “…DRNTU::Engineering::Industrial engineering::Supply chain…”
Get full text
Thesis -
159
Trip-chain based multimodal traffic assignment model with combined modes
Published 2015“…Existing multimodal traffic assignment models do not give a detailed description of trip-chain analysis with combined modes. This study develops a trip-chain based multimodal traffic assignment model with combined modes, which is helpful for deeper understanding of the multi-modal travel behaviour.…”
Get full text
Get full text
Get full text
Journal Article -
160
Intellectual property authentication by watermarking scan chain in design-for-testability flow
Published 2010“…The advantage of this scheme is the ownership legitimacy can be publicly authenticated on-site by IP buyers after the chip has been packaged by loading a specific verification code into the scan chain. We propose to integrate the scan chain watermarking with dynamic watermarking of the IP core to make the design hard-to-attack while the ownership is easy-totrace. …”
Get full text
Get full text
Conference Paper