Dangos 1 - 10 canlyniadau o 12 ar gyfer chwilio 'Li, Hui', amser ymholiad: 0.01e
Mireinio'r Canlyniadau
-
1
Governing Asia reflections on a research journey
Cyhoeddwyd 2015Rhif Galw: loading...
Wedi'i leoli: loading...Llyfr loading... -
2
PEM fuel cell failure mode analysis
Cyhoeddwyd 2012Rhif Galw: loading...
Wedi'i leoli: loading...Llyfr loading... -
3
PEM fuel cell diagnostic tools
Cyhoeddwyd 2012Rhif Galw: loading...
Wedi'i leoli: loading...Llyfr loading... -
4
Forensics in telecommunications, information, and multimedia Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers
Cyhoeddwyd 2011Rhif Galw: loading...Available for University of the Philippines Diliman via SpringerLink. Click here to access
Wedi'i leoli: loading...
Electronic Resource -
5
Information security 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings
Cyhoeddwyd 2011Rhif Galw: loading...Available for the University of the Philippines Diliman via SpringerLink. Click here to access
Wedi'i leoli: loading...
Electronic Resource -
6
Proton exchange membrane fuel cells contamination and mitigation strategies
Cyhoeddwyd 2010Rhif Galw: loading...
Wedi'i leoli: loading...Llyfr loading... -
7
The origin of cultivated plants in South-East Asia gan Li Hui-lin 1911-
Cyhoeddwyd 1966Rhif Galw: loading...
Wedi'i leoli: loading...Llyfr loading... -
8
Chinese flower arrangement gan Li, Hui-lin 1911-
Cyhoeddwyd 1959Rhif Galw: loading...
Wedi'i leoli: loading...Llyfr loading... -
9
The garden flowers of China. gan Li, Hui-lin 1911
Cyhoeddwyd 1959Rhif Galw: loading...
Wedi'i leoli: loading...Llyfr loading... -
10
Experimental and theoretical study on two types of shape memory alloy devices. gan Li, Hui
Cyhoeddwyd yn Earthquake engineering & structural dynamics.Rhif Galw: loading...
Wedi'i leoli: loading...Erthygl loading...
Offerynnau Chwilio:
Pynciau Perthynol
Proton exchange membrane fuel cells
Security measures
Testing
Computer crimes
Computer networks
Computer security
Data encryption (Computer science)
Electronic books
Equipment and supplies
Flower arrangement, Chinese
Flowers
Investigation
Periodicals
Plants, Cultivated
Plants, Ornamental
Public administration
Reliability
Study and teaching
System failures (Engineering)
Telecommunication systems