Showing 1,361 - 1,380 results of 1,683 for search '((((chers OR chern) OR cheaters) OR checked) OR (bear OR near))*', query time: 0.16s Refine Results
  1. 1361

    Floquet Codes without Parent Subsystem Codes by Davydova, Margarita, Tantivasadakarn, Nathanan, Balasubramanian, Shankar

    Published 2024
    “…However, unlike the honeycomb code, it possesses an explicit CSS structure and its gauge checks do not form a subsystem code. Nevertheless, we show that our dynamic protocol conserves logical information and possesses a threshold for error correction. …”
    Get full text
    Article
  2. 1362
  3. 1363

    Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications by Zyskind, Guy, Yanai, Avishay, Pentland, Alex

    Published 2024
    “…Using that deployment, we showcase the protocols' applicability for two interesting applications, policy checking and wallet exchange, as well as their efficiency by demonstrating low gas costs and fees.…”
    Get full text
    Article
  4. 1364

    Transverse momentum-dependent heavy-quark fragmentation at next-to-leading order by von Kuk, Rebecca, Michel, Johannes K. L., Sun, Zhiquan

    Published 2024
    “…Our final results in position space agree with those of a recent calculation by another group that used a highly orthogonal organization of singularities in the intermediate momentum-space steps, providing a strong independent cross check. As an immediate application, we present the complete quark mass dependence of the energy-energy correlator (EEC) in the back-to-back limit at (𝛼𝑠).…”
    Get full text
    Article
  5. 1365

    Disrupting Monocultural Tendencies through Multimodal Montage by Singha, Mrinalini

    Published 2024
    “…As an Indian artist, the author situates her own practice within this discourse, highlighting projects such as `The Whistleblower' (2023), a tangible archive within an everyday object, and `A Mystery for You' (2023-24), a fact-checking game that merges a tangible interface with a large language model (LLM). …”
    Get full text
    Get full text
    Thesis
  6. 1366

    Social tags as news event detectors by Chua, Alton Yeow Kuan, Razikin, Khasfariyati, Goh, Dion Hoe-Lian

    Published 2013
    “…Relative frequencies of the top 200 most frequently-used tags were analysed to check for spikes and bursts. Based on the results, four main findings emerged. …”
    Get full text
    Get full text
    Journal Article
  7. 1367

    Development of a mobile app for the thermal design of heat exchangers by Yap, Shi Kai

    Published 2021
    “…These include the fouling calculations and the flow-induced vibration check. The design of a STHE is extremely complicated and is a tedious process with many required calculations. …”
    Get full text
    Final Year Project (FYP)
  8. 1368

    Mobile application for optical character recognition (OCR) of digits by Luah, Yee Teng

    Published 2021
    “…To further improve the recognition accuracy, an API is created for sanity checks based on the domain knowledge adopted from clinicians. …”
    Get full text
    Final Year Project (FYP)
  9. 1369

    Crowd monitoring and detection by Li, Xin

    Published 2022
    “…However, it requires a lot of manpower to check the scanning pass and vaccination status which always lead to a long queue and make social distance hard to maintain. …”
    Get full text
    Final Year Project (FYP)
  10. 1370

    A fuzzy rough number extended AHP and VIKOR for failure mode and effects analysis under uncertainty by Zhu, Guoniu, Ma, Jin, Hu, Jie

    Published 2022
    “…A practical case study of the check valve is provided to validate the applicability of the proposed FMEA. …”
    Get full text
    Journal Article
  11. 1371

    Non-normal distribution of residual flexural strengths of steel fiber reinforced concretes and its impacts on design and conformity assessment by He, Shan, Yang, En-Hua

    Published 2022
    “…The logarithmic transformation provides a practical and convenient approach to design and to check the conformity of log-normally distributed SFRC properties adopting existing criteria. …”
    Get full text
    Journal Article
  12. 1372

    CT sigma delta ADC for audio applications by Hnin, Hnin Soe.

    Published 2009
    “…The non-idealities simulation was extensively run to check how much the overall system can take non-idealities behaviors of gain, gain bandwidth, slew-rate and linearity while meeting performance requirements. …”
    Get full text
    Final Year Project (FYP)
  13. 1373

    Towards explainable and semantically coherent claim extraction for an automated fact-checker by Yoswara, Jocelyn Valencia

    Published 2024
    “…Therefore, this project aims to enhance the claim extraction process of an automatic fact-checker, improve the accuracy of fact-checking, and mitigate the limitations associated with LLMs' reliance on outdated information. …”
    Get full text
    Final Year Project (FYP)
  14. 1374

    An ultra low-power precision sample-and-hold circuit for biomedical application by Mah, Sai Lei

    Published 2010
    “…The parameters that were used to check the precision of the S/H circuit are hold pedestal and total harmonic distortion. …”
    Get full text
    Final Year Project (FYP)
  15. 1375

    Online game for Chinese chess by Lee, Jia Woei.

    Published 2010
    “…Research from various sources such as internet, books and journals was done to enhance in understanding of the development of an online Chinese Chess game.The results had indicated that a simple move of a chess piece involves a lot of checking and consideration on the types of moves possible. …”
    Get full text
    Final Year Project (FYP)
  16. 1376

    Three dimensional numerical manifold method and rock engineering applications by He, Lei

    Published 2011
    “…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
    Get full text
    Thesis
  17. 1377

    Eye movement feature extraction for driver vigilance classification by Fu, Zhuxuan

    Published 2015
    “…Analysis of variance (ANOVA) test was employed to check if there exist significant differences among three stages within one driving period. …”
    Get full text
    Final Year Project (FYP)
  18. 1378

    SCE17-0185: STIX representation of cyber threat intelligence by Phua, Kin Wee

    Published 2018
    “…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
    Get full text
    Final Year Project (FYP)
  19. 1379

    A signal through the noise: accurate determination of hydrogen atom positions in crystal structures and optimisation of Laue neutron diffraction methods by Sackman, GA

    Published 2021
    “…This focuses on:</p> <p>Recommendations for the efficient collection of Laue neutron data, in order to optimise the data set completeness and awarded beam-time; strategic considerations for how to best answer the scientific question(s) at hand in a Laue neutron experiment, whilst planning against future contingencies; improving methods for crystal packing and shipping, particularly for air and moisture sensitive materials; discussing issues arising from ice forming on the crystal during a Laue neutron diffraction experiment, and methods for minimising this problem; more effectively modelling disorder using ring shapes, in the crystallographic refinement package CRYSTALS; providing rationale for Laue neutron specific checkCIF comments.</p> <p>Alongside the aforementioned research projects, the relevant history and theory contextualising the crystallographic methods used is presented.…”
    Thesis
  20. 1380

    A random-key genetic algorithm-based method for transportation network vulnerability envelope analysis under simultaneous multi-link disruptions by Gu, Y, Ryu, S, Xu, Y, Chen, A, Chan, H-Y, Xu, X

    Published 2024
    “…Specifically, the TNVE problem can be formulated as a binary integer bi-level program (BLP), in which the upper-level problem maximizes/minimizes the remaining network performance under a given number of disrupted links, and the lower-level problem adopts the shortest path problem to check the post-disruption connectivity of each origin–destination (O-D) pair while circumventing the cumbersome path enumeration or path set pre-generation. …”
    Journal article