Showing 321 - 340 results of 6,599 for search '((((ceers OR peers) OR check) OR peer) OR (bears OR bees))*', query time: 0.15s Refine Results
  1. 321

    Non-normal distribution of residual flexural strengths of steel fiber reinforced concretes and its impacts on design and conformity assessment by He, Shan, Yang, En-Hua

    Published 2022
    “…The logarithmic transformation provides a practical and convenient approach to design and to check the conformity of log-normally distributed SFRC properties adopting existing criteria. …”
    Get full text
    Journal Article
  2. 322

    CT sigma delta ADC for audio applications by Hnin, Hnin Soe.

    Published 2009
    “…The non-idealities simulation was extensively run to check how much the overall system can take non-idealities behaviors of gain, gain bandwidth, slew-rate and linearity while meeting performance requirements. …”
    Get full text
    Final Year Project (FYP)
  3. 323

    Ten quick tips for ensuring machine learning model validity by Goh, Wilson Wen Bin, Kabir, Mohammad Neamul, Yoo, Sehwan, Wong, Limsoon

    Published 2024
    “…The 10 quick tips described here discuss useful practices on how to check AI/ ML models from 2 perspectives—the user and the developer.…”
    Get full text
    Journal Article
  4. 324

    An ultra low-power precision sample-and-hold circuit for biomedical application by Mah, Sai Lei

    Published 2010
    “…The parameters that were used to check the precision of the S/H circuit are hold pedestal and total harmonic distortion. …”
    Get full text
    Final Year Project (FYP)
  5. 325

    Eye movement feature extraction for driver vigilance classification by Fu, Zhuxuan

    Published 2015
    “…Analysis of variance (ANOVA) test was employed to check if there exist significant differences among three stages within one driving period. …”
    Get full text
    Final Year Project (FYP)
  6. 326

    Design of a hybrid neural spike detection algorithm for implantable integrated brain circuits by Zeinolabedin, Seyed Mohammad Ali, Do, Anh Tuan, Yeo, Kiat Seng, Kim, Tony Tae-Hyoung

    Published 2016
    “…Once a potential spike is detected, NEO is executed to check whether the detected spike by absolute thresholding is valid. …”
    Get full text
    Get full text
    Conference Paper
  7. 327

    Petri net-based efficient determination of optimal schedules for transport-dominant single-arm multi-cluster tools by Yang, Fajun, Wu, Naiqi, Qiao, Yan, Zhou, Mengchu, Su, Rong., Qu, Ting

    Published 2018
    “…Thereafter, an efficient algorithm is developed to check the given conditions and find such a schedule efficiently if existing. …”
    Get full text
    Get full text
    Journal Article
  8. 328

    PEIGEN – a platform for evaluation, implementation, and generation of S-boxes by Sasaki, Yu, Ling, San, Guo, Jian, Bao, Zhenzhen

    Published 2019
    “…PEIGEN is aimed to be a platform covering a comprehensive check-list of design criteria of S-boxes appearing in the literature. …”
    Get full text
    Get full text
    Journal Article
  9. 329

    Experimental results of bispectral invariants discriminative power by Kubicki, Karol., Kakarala, Ramakrishna.

    Published 2013
    “…However, insufficient research has been conducted to check their behavior in practice. In this paper, results are presented pertaining to the discriminative power of bispectral invariants. …”
    Get full text
    Get full text
    Conference Paper
  10. 330

    A signal through the noise: accurate determination of hydrogen atom positions in crystal structures and optimisation of Laue neutron diffraction methods by Sackman, GA

    Published 2021
    “…This focuses on:</p> <p>Recommendations for the efficient collection of Laue neutron data, in order to optimise the data set completeness and awarded beam-time; strategic considerations for how to best answer the scientific question(s) at hand in a Laue neutron experiment, whilst planning against future contingencies; improving methods for crystal packing and shipping, particularly for air and moisture sensitive materials; discussing issues arising from ice forming on the crystal during a Laue neutron diffraction experiment, and methods for minimising this problem; more effectively modelling disorder using ring shapes, in the crystallographic refinement package CRYSTALS; providing rationale for Laue neutron specific checkCIF comments.</p> <p>Alongside the aforementioned research projects, the relevant history and theory contextualising the crystallographic methods used is presented.…”
    Thesis
  11. 331

    A random-key genetic algorithm-based method for transportation network vulnerability envelope analysis under simultaneous multi-link disruptions by Gu, Y, Ryu, S, Xu, Y, Chen, A, Chan, H-Y, Xu, X

    Published 2024
    “…Specifically, the TNVE problem can be formulated as a binary integer bi-level program (BLP), in which the upper-level problem maximizes/minimizes the remaining network performance under a given number of disrupted links, and the lower-level problem adopts the shortest path problem to check the post-disruption connectivity of each origin–destination (O-D) pair while circumventing the cumbersome path enumeration or path set pre-generation. …”
    Journal article
  12. 332

    Modelling and characterization of membrane fouling in osmotically-driven membrane processes (ODMPs) by Lai, Li

    Published 2021
    “…Performance of neural networks bears strong relationship with learning rate, number of hidden layers and number of nodes in hidden layer. …”
    Get full text
    Thesis-Doctor of Philosophy
  13. 333

    新加坡华人对中国的贡献 :新加坡城市规划之父刘太格个案研究 = Contributions of Singaporean Chinese to China : a case study on Singapore’s father of city planning Liu Thai Ker... by 冯时辉 Phang, Shi Hwee

    Published 2019
    “…However, in the fields of urban planning and development which bears the origins to the establishment of diplomatic relations between the two countries was left unexplored by the academic circles. …”
    Get full text
    Final Year Project (FYP)
  14. 334

    What information really matters in supervisor reduction? by Su, Rong, Wonham, Walter Murray

    Published 2020
    “…One strategy is to reduce the size of a supervisor to generate a control equivalent version, whose size is optimistically much smaller than the original one so that a user or control designer can easily check whether a designed controller fulfils its objectives and requirements. …”
    Get full text
    Journal Article
  15. 335

    A 4D imaging radar SLAM system for large-scale environments based on pose graph optimization by Zhuge, Huayang

    Published 2023
    “…This work proposes a full system for 4D Radar SLAM consisting of three modules: 1) Front-end module performs scan-to-scan matching to calculate the odometry based on GICP, considering the probability distribution of each point; 2) Loop detection utilizes multiple rule-based loop pre-filtering steps, followed by an intensity scan context step to identify loop candidates, and odometry check to reject false loop; 3) Back-end builds a pose graph using front-end odometry, loop closure, and optional GPS data. …”
    Get full text
    Thesis-Master by Coursework
  16. 336

    Possibility study of in-situ aeration on lorong halus dumping site by Teng, Esther Yuan Yi.

    Published 2012
    “…GS21 was used to assess the reactivity of waste and check the degree of stabilization of LHDG. RI4 was being carried out to determine whether the biodegradation of waste prefers to take place under aerobic conditions. …”
    Get full text
    Final Year Project (FYP)
  17. 337

    Boundary element methods for axisymmetric heat conduction and thermoelastic deformations in nonhomogeneous solids by Yun, Bao Ing

    Published 2013
    “…Unlike the real boundary element approach for axisymmetric problems, the complex variable approach does not require the evaluation of complicated fundamental solutions involving elliptic integrals. To check the validity of all the boundary element procedures, they are applied to solve specific problems with known analytical solutions. …”
    Get full text
    Thesis
  18. 338

    Encoding and decoding of serially concatenated codes for data storage systems by Yin, Ke.

    Published 2013
    “…The outer code of the SCC can be a high-rate convolutional code, or a low-density parity-check (LDPC) code; while the inner code normally takes the form of the accumulate code or a high-rate recursive convolutional code (RSC). …”
    Get full text
    Final Year Project (FYP)
  19. 339

    Unveiling the future of budget hotels in Singapore by Chua, Hwee Lian, Kew, Wong Yip, Soh, Wee Li

    Published 2014
    “…These include using Porter's five forces model to define the external environment in which budget hotels operate and a SWOT analysis to function as an internal check. The findings of this study point towards a shortage of budget hotels that is likely to persist till 1995. …”
    Get full text
    Final Year Project (FYP)
  20. 340

    Investigation of Ni as Zn substitute in CZTS thin film solar cell by Quek, Ka Jun

    Published 2018
    “…Energy-dispersive X-ray spectroscopy (EDX) was also done to check elemental composition of CNZTS in the thin film layer. …”
    Get full text
    Final Year Project (FYP)