Search alternatives:
pinga » pingat (Expand Search), pingao (Expand Search), ping (Expand Search)
pine » spine (Expand Search), ping (Expand Search), nine (Expand Search)
line » like (Expand Search), life (Expand Search)
fine » find (Expand Search), five (Expand Search)
pigs » igs (Expand Search), pig (Expand Search), pins (Expand Search)
pina » ping (Expand Search), pin (Expand Search), bina (Expand Search)
pinga » pingat (Expand Search), pingao (Expand Search), ping (Expand Search)
pine » spine (Expand Search), ping (Expand Search), nine (Expand Search)
line » like (Expand Search), life (Expand Search)
fine » find (Expand Search), five (Expand Search)
pigs » igs (Expand Search), pig (Expand Search), pins (Expand Search)
pina » ping (Expand Search), pin (Expand Search), bina (Expand Search)
-
2461
-
2462
Inferring passenger responses to urban rail disruptions using smart card data: A probabilistic framework
Published 2024“…We first identify 19 possible response behaviors that passengers may have based on their decision-making times and locations (i.e, the stage of their trips when an incident happened), including transferring to a bus line, canceling trips, waiting, delaying departure time, etc. …”
Get full text
Article -
2463
Round-Trip Time Ranging to Wi-Fi Access Points Beats GNSS Localization
Published 2024“…We demonstrate the method in a situation where there are no line-of-sight (LOS) connections and where the APs are inaccessible. …”
Get full text
Article -
2464
Towards Health Centered Drug Policy: An Analysis of Past and Developing Drug Policy
Published 2024“…As a result, many argue that policies which decriminalize marijuana are exacerbating the problem of drug addiction. Seemingly in line with this argument, overdose-related deaths–largely driven by increases in opioid consumption–have soared in recent years, and at the same time an increasing number of states have decriminalized marijuana. …”
Get full text
Thesis -
2465
From Shipyard to Sea: A Flexible System Design Approach to the Transition from Shipbuilding to Operations A Case Study Using the United States Coast Guard Offshore Patrol Cutter P...
Published 2024“…Dynamic post-delivery activities are reimagined as a continuous business line, to professionalize the transition of new ships from shipbuilding to operations.…”
Get full text
Thesis -
2466
-
2467
Visual hull based 3D reconstruction of shocks in under-expanded supersonic bevelled jets
Published 2019“…When applied to bevelled jets with non-uniform nozzle exit geometries, an additional assumption was made to address the problem of schlieren line-of-sight blockage by the non-conventional nozzle, and reconstruction errors were found to be larger near regions of poorer shock wave contrast. …”
Get full text
Get full text
Journal Article -
2468
Soy-derived phytochemical genistein modifies chromatome topology to restrict cancer cell proliferation
Published 2020“…We therefore investigated genistein effects on chromatin-bound proteins in the estrogen receptor-deficient cell line MDA-MB-231 which is insensitive to phytoestrogen signaling. …”
Get full text
Journal Article -
2469
Designing initiatives for vulnerable families : from theory to design in Sydney, Australia
Published 2020“…In applying the theory to the local situation the analysis took into account: the role of the local agencies; evidence of program effectiveness; determinants and outcomes for local children and their families; the current deployment of service resources; and insights from front-line staff and interagency partners.…”
Get full text
Journal Article -
2470
The impact of protozoan predation on the pathogenicity of Vibrio cholerae
Published 2020“…Many of these intra-phagosomal factors used to kill and digest bacteria are highly conserved between eukaryotic cells and thus are also expressed by the innate immune system in the gastrointestinal tract as the first line of defense against bacterial pathogens. Since pathogenic bacteria have been shown to be hypervirulent after they have passed through protozoa, the resistance to digestion by protist hosts in their natural environment plays a key role in enhancing the infectious potential of pathogenic Vibrio spp. …”
Get full text
Journal Article -
2471
Spin-orbit torque magnetization switching in Co/Pt multilayers for multistate memory and logic devices
Published 2021“…A compound structure using similar switching techniques is used to develop a reconfigurable logic device, in which an integrated bias field line allows for on-chip local Oersted field generation for breaking the switching symmetry in PMA devices. …”
Get full text
Thesis-Doctor of Philosophy -
2472
Programmable spin–orbit-torque logic device with integrated bipolar bias field for chirality control
Published 2021“…A reconfigurable SOT-driven logic device using a double Hall cross structure with an integrated bias field line for the generation of a local bias field is experimentally demonstrated. …”
Get full text
Journal Article -
2473
Explainable data-driven optimization for complex systems with non-preferential multiple outputs using belief rule base
Published 2022“…A practical case study on Changsha Metro Line 4 is studied to use multiple geological parameters to infer multiple operational parameters. …”
Get full text
Journal Article -
2474
Cluster-based information fusion for probabilistic risk analysis in complex projects under uncertainty
Published 2022“…The developed approach is used to assess the water leakage condition of Line 2 of the Wuhan metro system in China to demo its feasibility. …”
Get full text
Journal Article -
2475
A robust 6-D pose tracking approach by fusing a multi-camera tracking device and an AHRS module
Published 2022“…However, its 6-D tracking practicability is impaired by the line-of-sight issue and the complicated tracker based on multiple markers. …”
Get full text
Journal Article -
2476
Integrated optimization algorithm: a metaheuristic approach for complicated optimization
Published 2022“…IOA has also been applied to solve unit commitment problems in the power system and shows satisfactory results. A power line sub-image classification model based on a convolutional neural network (CNN) is optimized by DIOA. …”
Get full text
Journal Article -
2477
A transgenic zebrafish for in vivo visualization of cilia
Published 2023“…The cilia in multiple cell types are efficiently labelled by the encoded fusion protein from embryonic stages to adulthood, without any developmental and physiological defects. We show that the line allows live imaging of ciliary dynamics and trafficking of cilia proteins, such as Kif7 and Smo, key regulators of the Hedgehog signalling pathway. …”
Get full text
Journal Article -
2478
Investigation of the fuel consumption of a ship considering the dynamic coupling effect among resistance, propeller torque and engine power under the control of a governor
Published 2023“…Through developing the model, it was found that the engine speed would accelerate at an unrealistic rate, and a slope limiter was fitted in order to control the rate of change of engine speed in line with the manufacturer’s specifications. Thereafter, the effects of using the model to simulate real conditions were studied, with an emphasis on evaluating model performance given real inputs such as wind and wave resistance values. …”
Get full text
Final Year Project (FYP) -
2479
Bolstering functionality in multilayer and bilayer WS₂ via focused laser micro-engraving
Published 2023“…Coupled with the flexible maneuver of the laser, various monolayer designs can be achieved, including micro-antenna, waveguide, and electrode geometries with lateral line widths at 1.5 µm resolution. Furthermore, we also detail the optical properties of the monolayers obtained from laser thinning, with those acquired from multilayers containing more defect-bound excitons, whereas those lasered from bilayers presenting a trion-dominated profile similar to as-grown monolayers. …”
Get full text
Journal Article -
2480
Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies?
Published 2024“…Device identification is the first line of defense to detect and stop fraud. Conventional device authentication schemes using software addresses as identities or static pre-programmed secret keys are vulnerable to tampering and memory attacks. …”
Get full text
Journal Article