Search alternatives:
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
sheer » shear (Expand Search), sheet (Expand Search), steer (Expand Search)
cher » chen (Expand Search), chee (Expand Search), her (Expand Search)
cherse » chense (Expand Search), cheese (Expand Search), herse (Expand Search), cherie (Expand Search)
cheras » chenas (Expand Search), cheeas (Expand Search), heras (Expand Search), chimeras (Expand Search)
chern » chenn (Expand Search), cheen (Expand Search), hern (Expand Search), chen (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
sheer » shear (Expand Search), sheet (Expand Search), steer (Expand Search)
cher » chen (Expand Search), chee (Expand Search), her (Expand Search)
cherse » chense (Expand Search), cheese (Expand Search), herse (Expand Search), cherie (Expand Search)
cheras » chenas (Expand Search), cheeas (Expand Search), heras (Expand Search), chimeras (Expand Search)
chern » chenn (Expand Search), cheen (Expand Search), hern (Expand Search), chen (Expand Search)
-
141
Robotic manipulation of microscopic objects using multiple laser-driven fingertips
Published 2017Get full text
Thesis-Doctor of Philosophy -
142
Application of smartphone-based biophotonic instrumentation for glucose sensing using colorimetric method
Published 2024“…The calibration curves consistently confirm that the proposed method aligns with the Beer-Lambert law, in accordance with expectations with previous studies. …”
Get full text
Monograph -
143
-
144
Non-Hermitian extension of the Haldane model induced by non-reciprocal hopping
Published 2023“…The degeneracies in the non-Hermitian framework are categorized, followed by the Chern number topological phase transi- tions. In the presence of non-Hermiticity however, there is a failure of the correspon- dence between the bulk and the boundary which is attributed to the non-Hermitian skin effect. …”
Get full text
Final Year Project (FYP) -
145
A comparative study between turbulence model RSM results of a dual inlet cyclone separator and k-epsilon RNG turbulence model
Published 2023“…The research evalute the results of Wang et al. 's (Chern Eng Process Intensification 158:108188, [2]) dual :intake cyclODe separator (known as 90° DI CyclODe) with a 7, 10, and 12 Jtm particle diameter and inlet velocity 15.5 m/s. …”
Get full text
Conference or Workshop Item -
146
Numerical and Analytical Methods in Low-Dimensional Strongly Correlated Quantum Systems
Published 2024“…Furthermore, the thesis derives a Hamiltonian lattice formulation for the 2+1D compact Maxwell-Chern-Simons theory, providing an analytical solution that aligns with continuum theories and facilitating future numerical applications. …”
Get full text
Thesis -
147
Adaptative grasp planning for manipulation of micro-objects
Published 2022Get full text
Thesis-Master by Coursework -
148
-
149
Prevalence of West Nile virus in domesticated mammals (cattle, goat, horse and pig) in selected areas of Peninsular Malaysia
Published 2022“…The horses were from Cheras (n=4) and Putrajaya (n=3). There were no significant differences between sex and location with the WNV molecular positivity (p > 0.05). …”
Get full text
Thesis -
150
Development of a learning system for robot control
Published 2020Get full text
Final Year Project (FYP) -
151
Development of a robot vision system for object detection and localization
Published 2020Get full text
Thesis-Master by Coursework -
152
Acoustic valley edge states in a graphene-like resonator system
Published 2019“…Similar to a gapped graphene, gapless topological valley edge states can be found at a zigzag domain wall separating different domains with opposite valley Chern numbers, while an armchair domain wall hosts no gapless edge states. …”
Get full text
Get full text
Journal Article -
153
Non-invertible Condensation, Duality, and Triality Defects in 3+1 Dimensions
Published 2023“…Interestingly, the fusion coefficients are generally not numbers, but 2+1d TQFTs, such as invertible SPT phases, $${\mathbb {Z}}_N$$ Z N gauge theories, and $$U(1)_N$$ U ( 1 ) N Chern-Simons theories. The associativity of these algebras over TQFT coefficients relies on nontrivial facts about 2+1d TQFTs. …”
Get full text
Article -
154
-
155
Multiple Brillouin zone winding of topological chiral edge states for slow light applications
Published 2024“…Photonic Chern insulators are known for their topological chiral edge states (CESs), whose absolute existence is determined by the bulk band topology, but concrete dispersion can be engineered to exhibit various properties. …”
Get full text
Journal Article -
156
Brewers’ spent grains as potential novel functional food ingredients for food security
Published 2021“…BSG are residues generated as side streams from beer production. Currently, BSG are used as animal feed or disposed in landfills and these massive amount of BSG generated annually are causing significant environmental, economic, and climatic issues. …”
Get full text
Thesis-Doctor of Philosophy -
157
-
158
Coupled acoustic resonator systems with novel acoustic properties
Published 2021“…Similar to a gapped graphene, gapless topological valley edge states are shown at a zigzag domain wall separating different domains with opposite valley Chern numbers, while an armchair domain wall hosts no gapless edge states. …”
Get full text
Thesis-Doctor of Philosophy -
159
Electronic structures of twisted two-dimensional materials studied by angle-resolved photoemission spectroscopy
Published 2021“…Chiral semimetals the PtGa family (PtGa, PtAl,PdGa) are expected to host topologically non-trivial electronic structure, such as the multi-fold band crossings with large Chern number at high symmetry points connected by long Fermi-arc surface states. …”
Thesis -
160
Physical unclonable function based solutions to unification of user, device and data authentication
Published 2020“…The non-repudiation assumption of these conventional techniques is being challenged by emerging artificial-intelligent assisted and malware-based attacks on independently chained weak links (factors), and their limited extension to IoT scenarios, where the sheer number of inexpensive and often insufficiently protected endpoints prevent application of standard, secret-key based techniques. …”
Get full text
Thesis-Doctor of Philosophy