Search alternatives:
ceers » cheers (Expand Search), beers (Expand Search), cers (Expand Search)
cnrs » cars (Expand Search)
ceres » cereus (Expand Search), cores (Expand Search), cares (Expand Search)
peers » peer (Expand Search)
ceers » cheers (Expand Search), beers (Expand Search), cers (Expand Search)
cnrs » cars (Expand Search)
ceres » cereus (Expand Search), cores (Expand Search), cares (Expand Search)
peers » peer (Expand Search)
-
181
Conference report: authoritative speech in the Himalayan region
Published 2024“…Sales and Lecomte-Tilouine, both accomplished anthropologists of Nepal, are affiliated with the Centre National de Recherche Scientifique (CNRS), in Paris. For the two days of the conference, whenever participants played audio-visual recordings, the urgent strains of shamanic drumming and chants punctured the tranquility of the Maison Suger, a quiet haven in the bustling centre of Paris, where the proceedings occurred. …”
Get full text
Journal Article -
182
An Unusual Harassment Training That Was Warmly Received and Also Inspired Bystanders
Published 2025Get full text
Working Paper -
183
Singapore Shipping Trust.
Published 2009“…We also explore the shipping trusts’ financial performance through comparison with the Singapore market, as well as with Singapore REITs, Singapore shipping stocks and their foreign peers. Results from CAPM show presence of risk-adjusted returns for the equal-weighted shipping trust portfolio in the before-subprime period, indicating the attractiveness of shipping trusts during better economic conditions. …”
Get full text
Final Year Project (FYP) -
184
The friendly muse : ADM student wellbeing
Published 2017“…Drawing from personal experience and that of fellow peers, the project investigates how to create a more relatable, approachable and contextualized experience for ADM students.…”
Get full text
Final Year Project (FYP) -
185
-
186
Center potential
Published 2023“…To ensure the safety and trustworthiness of tutors, this application incorporates a rigorous verification process, which includes background checks, identity verification, and qualification validation. …”
Get full text
Final Year Project (FYP) -
187
Application development on an Android smart-phone
Published 2012“…The application intercepts all incoming messages and checks them for a certain password which uniquely identifies the owner. …”
Get full text
Final Year Project (FYP) -
188
Evaluation and fabrication of damaged composite material using non-destructive testing
Published 2019“…Since composites are extensively employed in many areas, it is important to determine the existence of surface and sub-surface defects before production and during regular maintenance checks. As time goes on, wear and tear occur to a material. …”
Get full text
Final Year Project (FYP) -
189
Experiences, perceptions and ethical considerations of the malaria infection study in Thailand
Published 2025“…We found that although compensation was a motivation for participation, this was secondary to it being beneficial to self (health checks; link to health networks; building merit) and others (medical research contribution; altruism). …”
Journal article -
190
Three essays on frictions of trade
Published 2018“…The analysis is based on an adapted gravity model with several alternative specifications for robustness checks. The result suggests that improvements on the road network lead to trade expansion on both intensive and extensive margins, but the effects vary across the regions. …”
Thesis -
191
A study of periodic behaviors
Published 2014“…It is our belief that the model is directly applicable in mining periodic behaviors for moving users of telecommunication companies with their GPS data or moving users of location-based social networks with their check-in data.…”
Get full text
Final Year Project (FYP) -
192
A study to minimize 'A'-pillar blind spot in cars
Published 2018“…The solution proposals seek to help drivers check the blind spot passively without requiring them to look around the A-pillar. …”
Get full text
Final Year Project (FYP) -
193
Preparation and characterisation of smart polymer gels for wearable electronics
Published 2018“…The dielectric layer that was fabricated with a catechol-group polymer and Ionic Liquid, had shown healing capabilities when placed under conditions at 100°C for 10 minutes. Furthermore, a check on the capacitance value had shown that these dielectric layers functioned at above 1μF/𝑐𝑚2 at 20Hz, which are high capacitance values. …”
Get full text
Final Year Project (FYP) -
194
State-feedback control design for polynomial discrete-time systems obtained via second-order Runge-Kutta discretization
Published 2024“…The sum of squares formulation was used to check the constraints. Two approaches are presented, the first makes use of the Lyapunov function to recover the gain matrices. …”
Get full text
Conference or Workshop Item -
195
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies
Published 2025Get full text
Article -
196
Essays on oil price fluctuations, financial markets and international trade
Published 2014“…The stability of the causality is also checked and the estimated impulse responses across different periods are examined. …”
Get full text
Thesis -
197
-
198
Thermal-mechanical design of sandwich SiC power module with micro-channel cooling
Published 2013“…Finite element analysis of thermal stress was further carried out to check that the CTE mismatch in the packaging has been minimized.…”
Get full text
Get full text
Conference Paper -
199
Characterizing 4-string contact interaction using machine learning
Published 2024“…We also train a neural network distinguishing vertex from Feynman region. As a check, 4-tachyon contact term in the tachyon potential is computed and a good agreement with the results in the literature is observed. …”
Get full text
Article -
200
Multi-objectives firefly algorithm for task offloading in the edge-fog-cloud computing
Published 2024“…Additionally, it verifies the status of the server (on/off) before offloading; if the server is unavailable, the algorithm proceeds to check the next layer. In the second stage, the strategy employs a Multi-objective Firefly (MFA) algorithm to assign the optimal computational device within the selected layer. …”
Get full text
Article