Search alternatives:
invasion » inversion (Expand Search), invasive (Expand Search)
band » hand (Expand Search), land (Expand Search)
base » case (Expand Search)
based » cased (Expand Search)
cease » ease (Expand Search), chase (Expand Search)
chased » phased (Expand Search), chase (Expand Search), ceased (Expand Search)
invasion » inversion (Expand Search), invasive (Expand Search)
band » hand (Expand Search), land (Expand Search)
base » case (Expand Search)
based » cased (Expand Search)
cease » ease (Expand Search), chase (Expand Search)
chased » phased (Expand Search), chase (Expand Search), ceased (Expand Search)
-
21
Large-Scale Equipment and Higher Performance Materials for Laser Additive Manufacturing
Published 2016Get full text
Get full text
Conference Paper -
22
Analysis and design recommendations for structures strengthened by prestressed bonded Fe-SMA
Published 2024Get full text
Journal Article -
23
Breaking permutation-based mesh steganography and security improvement
Published 2021Get full text
Journal Article -
24
Metrics to relate COVID-19 wastewater data to clinical testing dynamics
Published 2022Get full text
Journal Article -
25
Stylistic reproduction in the English version of Winter Pasture from the perspective of the stylistic markers theory
Published 2023Get full text
Thesis-Master by Coursework -
26
Localization of weakly disordered flat band states
Published 2017Get full text
Get full text
Journal Article -
27
OCT Intensity of the Region between Outer Retina Band 2 and Band 3 as a Biomarker for Retinal Degeneration and Therapy
Published 2024“…This study investigated the outer retina band (ORB) pattern and reflective intensity for the region between bands 2 and 3 (Dip) in three mouse models of inherited retinal degeneration (Rs1KO, TTLL5KO, RPE65KO) and in human AMD patients from the A2A database. …”
Get full text
Article -
28
-
29
-
30
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
Published 2024“…Recently, an improved version of the GGH cryptosystem, namely the GGH-MKA cryptosystem, has been proven immune to the embedding-based attacks. …”
Get full text
Article -
31
Holographic arrays based on semiconductor microstructures
Published 2017Get full text
Get full text
Journal Article -
32
-
33
-
34
Memory-based learning for article generation
Published 2011Get full text
Get full text
Conference Paper -
35
-
36
A novel grid-based clustering algorithm
Published 2022“…Researchers have created many versions of the clustering method using the grid-based approach. …”
Get full text
Journal Article -
37
Offline and computer‐based elearning interventions for medical students' education
Published 2018Get full text
Get full text
Journal Article -
38
Effect of surface mechanical treatments on the microstructure-property-performance of engineering alloys
Published 2020Get full text
Journal Article -
39
A 6bit 1.2GS/s symmetric successive approximation energy-efficient time-to-digital converter in 40nm CMOS
Published 2020Get full text
Conference Paper -
40
Smart sleep monitoring: sparse sensor-based spatiotemporal CNN for sleep posture detection
Published 2024Get full text
Journal Article