Finding Contents or People

Tri-level transmission expansion planning under intentional attacks: virtual attacker approach - part I: formulation
Tri-level transmission Expansion planning under intentional attacks: virtual attacker approach-part II: case studies
Tri-level transmission Expansion planning under intentional attacks: virtual attacker approach-part II: case studies
Application of an Improved Genetic Algorithm for Optimal Design of Planar Steel Frames
Effects of SPS parameters on the densification and mechanical properties of TiB2-SiC composite
Effects of SPS parameters on the densification and mechanical properties of TiB2-SiC composite
Formation mechanism of intermetallic components during dissimilar diffusion bonding of IN718/BNi-2/AISI 316 L by TLP process
Design and fabrication of poly (glycerol sebacate)-based fibers for neural tissue engineering: Synthesis, electrospinning, and characterization
Universal designated verifier signature scheme with non-delegatability in the standard model
Universal designated verifier signature scheme with non-delegatability in the standard model
Universal designated verifier signature scheme with non-delegatability in the standard model
Bond mechanism of EBROG method using a single groove to attach CFRP sheets on concrete
Mix design of the green self-consolidating concrete: Incorporating the waste glass powder
robust economic design of t2 control chart in variable sampling interval schemes
Evaluation of the mechanical properties of the heat treated FeCrCuMnNi high entropy alloy