Search alternatives:
band » hand (Expand Search), land (Expand Search)
base » based (Expand Search), case (Expand Search)
ceased » cease (Expand Search), eased (Expand Search), ceases (Expand Search)
chased » phased (Expand Search), chase (Expand Search), cased (Expand Search)
band » hand (Expand Search), land (Expand Search)
base » based (Expand Search), case (Expand Search)
ceased » cease (Expand Search), eased (Expand Search), ceases (Expand Search)
chased » phased (Expand Search), chase (Expand Search), cased (Expand Search)
-
181
A simulation-based dynamic traffic assignment model with combined modes
Published 2015Get full text
Get full text
Get full text
Journal Article -
182
Differences in pulse manifestations at Cunkou based on simplified modeling of tactile sensing
Published 2024“…The arterial pressures measured invasively with equipment from 14 patients with aorta coarctation were processed to simulate different pulse manifestations at Cun, Guan, and Chi positions of Cunkou when different compression levels were applied. …”
Get full text
Journal Article -
183
AptaFluorescence: an aptamer-based fluorescent imaging protocol for biomolecule visualization
Published 2025Get full text
Journal Article -
184
M-OTDR sensing system based on 3D encoded microstructures
Published 2017Get full text
Get full text
Journal Article -
185
Excitation of surface electromagnetic waves in a graphene-based Bragg grating
Published 2013Get full text
Get full text
Journal Article -
186
Wireless measurement of elastic and plastic deformation by a metamaterial-based sensor
Published 2014Get full text
Get full text
Journal Article -
187
Implementation of optimization-based power management for all-electric hybrid vessels
Published 2019Get full text
Get full text
Journal Article -
188
Knapsack-based reverse influence maximization for target marketing in social networks
Published 2019Get full text
Get full text
Get full text
Journal Article -
189
Wavelet-based compression of medical images: Filter-bank selection and evaluation
Published 2003“…Wavelet-based image coding algorithms (lossy and lossless) use a fixed perfect reconstruction filter-bank built into the algorithm for coding and decoding of images. …”
Article -
190
Task-based navigation of a taxonomy interface to a digital repository
Published 2014Get full text
Get full text
Get full text
Journal Article -
191
Pedestrian heading estimation based on spatial transformer networks and hierarchical LSTM
Published 2021Get full text
Journal Article -
192
Spin-based magnetic random-access memory for high-performance computing
Published 2024Get full text
Journal Article -
193
Wetting transition of sessile and condensate droplets on copper-based superhydrophobic surfaces
Published 2019Get full text
Get full text
Journal Article -
194
Weighted-persistent-homology-based machine learning for RNA flexibility analysis
Published 2021Get full text
Journal Article -
195
Nonlinear polariton parametric emission in an atomically thin semiconductor based microcavity
Published 2022Get full text
Journal Article -
196
Comparison of Techniques for Measuring Research Coverage of Scientific Papers: A Case Study
Published 2016Get full text
Get full text
Conference Paper -
197
-
198
Application of smartphone-based biophotonic instrumentation for glucose sensing using photometric method
Published 2024“…This study aimed to apply smartphone-based biophotonic instrumentation for measuring glucose concentrations using the photometric method. …”
Get full text
Monograph -
199
Physical unclonable function based solutions to unification of user, device and data authentication
Published 2020“…These solutions are typically realized using conventional techniques that require the safekeeping of a secret binary key in the non-volatile memory, or battery-backed SRAM of some device, or a token owned by the user, which have been proven to be vulnerable to various kinds of invasive, semi-invasive and side channel attacks. The non-repudiation assumption of these conventional techniques is being challenged by emerging artificial-intelligent assisted and malware-based attacks on independently chained weak links (factors), and their limited extension to IoT scenarios, where the sheer number of inexpensive and often insufficiently protected endpoints prevent application of standard, secret-key based techniques. …”
Get full text
Thesis-Doctor of Philosophy -
200
Comparisons of risk-based decision rules for the application of water resources planning and management
Published 2015Get full text
Get full text
Journal Article