Search alternatives:
line » like (Expand Search), life (Expand Search), linke (Expand Search)
pinn » ping (Expand Search), pin (Expand Search), pina (Expand Search)
bina » bing (Expand Search)
lin » link (Expand Search)
ning » ling (Expand Search), ming (Expand Search), ying (Expand Search)
shing » ching (Expand Search), sheng (Expand Search), shin (Expand Search)
line » like (Expand Search), life (Expand Search), linke (Expand Search)
pinn » ping (Expand Search), pin (Expand Search), pina (Expand Search)
bina » bing (Expand Search)
lin » link (Expand Search)
ning » ling (Expand Search), ming (Expand Search), ying (Expand Search)
shing » ching (Expand Search), sheng (Expand Search), shin (Expand Search)
-
1521
Computational and experimental study of a platinum thin-film based oil condition and contamination sensor
Published 2017“…The sensor is able to detect any form of contamination in oil and can be used for both off-line and on-line condition monitoring. The sensor is found to be quite sensitive and can detect extremely small concentrations of contaminants of the order 0.01 % by volume. …”
Conference item -
1522
-
1523
Elucidation of the EP defect in Diamond-Blackfan anemia by characterization and prospective isolation of human EPs
Published 2015“…By combining flow cytometry, cell-sorting, and single-cell clonogenic assays, we identified Lin(-)CD34(+)CD38(+)CD45RA(-)CD123(-)CD71(+)CD41a(-)CD105(-)CD36(-) bone marrow cells as EEP giving rise to BFU-E, and Lin(-)CD34(+/-)CD38(+)CD45RA(-)CD123(-)CD71(+)CD41a(-)CD105(+)CD36(+) cells as LEP giving rise to CFU-E, in a hierarchical fashion. …”
Journal article -
1524
Economic Nonlinear Model Predictive Control of Continuous Viral Bioreactors
Published 2024Get full text
Article -
1525
Security enhancement of the communication-efficient AUTHMAC_DH protocols
Published 2013“…In this paper, we first analyze the vulnerability of an AKD protocol under the off-line guessing attack. Then, we propose an enhanced AKD protocol to overcome the vulnerability. …”
Get full text
Get full text
Journal Article -
1526
-
1527
Tumor cell-intrinsic signals promoting tolerance and adaptation to oncogenic kinase inhibition
Published 2024“…Using commonly prescribed TK inhibitors (TKIs), I show that TK genetic status generally predicts whether or not a cell line will show any response to genotype-matched TKI (GM-TKI), but is insufficient to predict drug tolerance, the ability of a cell line to sustain proliferation under drug. …”
Get full text
Get full text
Thesis -
1528
-
1529
Completing Your Qualitative Dissertation : A Road Map From Beginning to End /
Published 2018Get full text
software, multimedia -
1530
-
1531
JustGivit
Published 2021“…This application helps further contribute to reducing the waste through indirect means such as donating and exchanging goods instead of disposing them directly into the trash bin. For donating, it digitizes charity operations in terms of donating unwanted and reusable goods locally in a more efficient manner and offers to reach out to wider target audiences. …”
Get full text
Final Year Project (FYP) -
1532
Bioinformatics study of enteroviruses which cause waterborne diseases
Published 2010Get full text
Final Year Project (FYP) -
1533
Dubai’s energy efficiency drive
Published 2015“…The United Arab Emirates is home to one such scheme, where Dubai is working towards the production of 1000 MW at its Sheikh Mohammed bin Rashid Al Maktoum solar park. However, another area – demand side management – has also been emerging; this could be critical in ensuring the Gulf region’s sustainable growth over the years to come. …”
Journal article -
1534
NEGOTIATE your way to RICHES /
Published 2003“…And just as important, it will show you how to go about "convincing others to give you what you want." BOTTOM LINE: if you buy or sell anything personally or professionally, this book can make or save you a fortune!.…”
text -
1535
The Battle for ‘Trayvon Martin’: Mapping a Media Controversy Online and Offline
Published 2020“…But the story gained attention and controversy over Martin’s death dominated headlines, airwaves, and Twitter for months, thanks to a savvy publicist working on behalf of the victim’s parents and a series of campaigns off–line and online. Using the theories of networked gatekeeping and networked framing, we map out the vast media ecosystem using quantitative data about the content generated around the Trayvon Martin story in both off–line and online media, as well as measures of engagement with the story, to trace the interrelations among mainstream media, nonprofessional and social media, and their audiences. …”
Get full text
Article -
1536
Keep your money, lose your “friend” : the moderating role of money in effects of social loneliness on anthropomorphism
Published 2019“…One line of research suggests that when people feel lonely, they may engage in anthropomorphic processes to satisfy their need to create social connection. …”
Get full text
Final Year Project (FYP) -
1537
Library cafes : next logical step
Published 2021“…But now, in the more relaxed, unencumbered age in which we live traditional library customs and practices once held sacrosanct are being re-evaluated in relation to the bottom line. And the bottom line, at least as far as public libraries are concerned, is getting more people to use the library.…”
Get full text
Journal Article -
1538
Noise coupling analysis in integrated circuit packaging
Published 2015“…The impedance of the transmission line is exceptionally significant, as if any mismatch on the transmission line, the quality of the signal will be affected negatively. …”
Get full text
Final Year Project (FYP) -
1539
Non-abelian representations of some sporadic geometries
Published 2013“…For a point-line incidence system S =(P, L) with three points per line we define the universal representation group of S asR(S)= 〈zp, p∈P|zp^2=1 for p∈P,zp zq zr = 1 for {p,q,r} ∈ L〉We prove that if G is the 2-local parabolic geometry of the sporadic simple group F1(the Monster) or F2(the Baby Monster) thenR(G)≅F1or 2·F2, respectively.…”
Get full text
Get full text
Journal Article -
1540
Counterexample computation in compositional nonblocking verification
Published 2018Get full text
Get full text
Journal Article