Search alternatives:
cheers » cheaters (Expand Search), chees (Expand Search), chers (Expand Search), sheers (Expand Search)
checkers » checker (Expand Search), checks (Expand Search), checked (Expand Search)
cheer » chee (Expand Search), cher (Expand Search), sheer (Expand Search)
beer » peer (Expand Search), bee (Expand Search), bear (Expand Search)
cheers » cheaters (Expand Search), chees (Expand Search), chers (Expand Search), sheers (Expand Search)
checkers » checker (Expand Search), checks (Expand Search), checked (Expand Search)
cheer » chee (Expand Search), cher (Expand Search), sheer (Expand Search)
beer » peer (Expand Search), bee (Expand Search), bear (Expand Search)
-
7781
-
7782
Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications
Published 2024“…Using that deployment, we showcase the protocols' applicability for two interesting applications, policy checking and wallet exchange, as well as their efficiency by demonstrating low gas costs and fees.…”
Get full text
Article -
7783
Disrupting Monocultural Tendencies through Multimodal Montage
Published 2024“…As an Indian artist, the author situates her own practice within this discourse, highlighting projects such as `The Whistleblower' (2023), a tangible archive within an everyday object, and `A Mystery for You' (2023-24), a fact-checking game that merges a tangible interface with a large language model (LLM). …”
Get full text
Get full text
Thesis -
7784
Three dimensional numerical manifold method and rock engineering applications
Published 2011“…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
Get full text
Thesis -
7785
SCE17-0185: STIX representation of cyber threat intelligence
Published 2018“…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
Get full text
Final Year Project (FYP) -
7786
Integration of genetic data and genomic annotation in the analysis of genome wide association studies
Published 2017“…To fine map these loci and assign functional annotation, I created Bayesian credible sets and checked for overlap between SNPs in these credible sets and regulatory marks in the Encyclopaedia of DNA Elements (ENCODE) database. …”
Thesis -
7787
Prevalence of sleep disturbance in patients with ankylosing spondylitis: a systematic review and meta-analysis
Published 2023“…Heterogeneity among the identified studies was checked using the I2 index, and the Begg and Mazumdar correlation test examined the existence of published bias. …”
Get full text
Article -
7788
A Multi-tier Model and Filtering Approach to Detect Fake News Using Machine Learning Algorithms
Published 2024“…The best performance of sequence for both datasets is LR_DT_RF which yields 0.9892 F1-Score, 0.9895 Accuracy, and 0.9790 Matthews Correlation Coefficient (MCC) for ISOT Fake News Dataset, and 0.9913 F1-Score, 0.9853 Accuracy, and 0.9455 MCC for CHECKED Dataset. This research could give researchers an approach for fake news detection on different social platforms and feature-based.…”
Get full text
Article -
7789
15.571 Generating Business Value from Information Technology, Spring 2007
Published 2010“…The familiar components of the place: cash, checks, paper reports and documents, store fronts, and face to face meetings remain important, but less so. …”
Get full text
Learning Object -
7790
A multidisciplinary survey of computational techniques for the modelling, simulation and analysis of biochemical networks
Published 2011“…From a practical point of view, in silico experiments can be performed that would be very expensive or impossible to achieve in the laboratory, such as hypothesis-testing with regards to knock-out experiments or overexpression, or checking the validity of a proposed molecular mechanism. …”
Get full text
Get full text
Journal Article -
7791
Greenly prepared antimicrobial cotton fabrics using bioactive agents from Cupressaceae pods
Published 2022“…Finally, the antimicrobial activity of the greenly developed antimicrobial cotton fabrics was checked against Staphylococcus, Escherichia coli, Bacillus and Candida albicans by using the AATCC 100-2004 test method. …”
Get full text
Get full text
Article -
7792
Identification of electromagnetic pre-earthquake perturbations from the DEMETER data by machine learning
Published 2021“…In this paper, we explore 16 spot-checking classification algorithms, among which, the top classifier with low-frequency power spectra of electric and magnetic fields was used for ionospheric perturbation analysis. …”
Get full text
Journal Article -
7793
Mediation effects of language anxiety and prior learning experience on academic speaking challenges and strategies among Libyan students in Malaysian universities
Published 2023“…Field notes and member checks were used for validation. Correlational procedures, structural equation modeling (SEM), and bootstrapping resampling analyses were conducted to examine the relationships between variables, validate study models, and test research hypotheses. …”
Get full text
Article -
7794
-
7795
Center potential
Published 2023“…To ensure the safety and trustworthiness of tutors, this application incorporates a rigorous verification process, which includes background checks, identity verification, and qualification validation. …”
Get full text
Final Year Project (FYP) -
7796
Experiences, perceptions and ethical considerations of the malaria infection study in Thailand
Published 2025“…We found that although compensation was a motivation for participation, this was secondary to it being beneficial to self (health checks; link to health networks; building merit) and others (medical research contribution; altruism). …”
Journal article -
7797
Security for automotive electrical/electronic (E/E) architectures
Published 2018“…SAAN uses probabilistic model checking to calculate the security of automotive networks, based on the architecture and expert evaluations of components. …”
Get full text
Get full text
Thesis -
7798
A comparative analysis of ENCODE and Cistrome in the context of TF binding signal
Published 2024“…Moreover, the output format of the processing (BED narrowPeak) exposes a feature, the signalValue, which is seldom used in consistency checks, but can offer valuable insight on the quality of the data. …”
Get full text
Journal Article -
7799
kboolnet: a toolkit for the verification, validation, and visualization of reaction-contingency (rxncon) models
Published 2023“…The verification script VerifyModel.R checks for responsiveness to repeated stimulations as well as consistency of steady state behavior. …”
Get full text
Article -
7800
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies
Published 2025Get full text
Article