Search alternatives:
sets » set (Expand Search)
Showing 321 - 340 results of 3,572 for search '(((bears OR ((sets OR ber) OR belt)) OR bee) OR beenr)', query time: 0.14s Refine Results
  1. 321

    Frequency domain MDPSK based non-equalization OFDM for coherent free-space optical communication over modified rician turbulence channel by Chen, Chen, Zhong, Wen-De, Li, Xiang

    Published 2015
    “…Our study shows that NE-OFDM attains a comparable BER performance to equalized OFDM, but with lower complexity and higher spectral efficiency.…”
    Get full text
    Get full text
    Get full text
    Conference Paper
  2. 322

    Co-existing study of a radar and communication (Radcomm) system by Tan, Danial Norman Jee Chuan

    Published 2021
    “…The performance evaluation for the communication aspect of the coexisting system will be based on the bit-error rate (BER) while the detected target range will determine the performance of the radar system using range-speed response pattern (RSRP) plots.…”
    Get full text
    Final Year Project (FYP)
  3. 323
  4. 324
  5. 325

    Fragmentation of white phosphorus by a cyclic (alkyl)(amino)alumanyl anion by Koshino, Kota, Kinjo, Rei

    Published 2022
    “…Structural and electronic features of the latter were fully characterized by standard spectroscopic means, X-ray diffraction analysis, and computational studies, which revealed that 2 bears highly polarized Al (δ+) and P (δ-) and relatively short Al-P bonds, indicative of the σ-donating and π-accepting nature of CAAAl groups.…”
    Get full text
    Journal Article
  6. 326

    HyMap imagery for copper and manganese prospecting in the east of Ameln valley shear zone (Kerdous inlier, western Anti-Atlas, Morocco) by Hajaj, Soufiane, El Harti, Abderrazak, Jellouli, Amine, Pour, Amin Beiranvand, Himyari, Saloua Mnissar, Hamzaoui, Abderrazak, Bensalah, Mohamed Khalil, Benaouiss, Naima, Hashim, Mazlan

    Published 2024
    “…Finally, this investigation highlights the significant potential of HyMap imagery for mineral exploration in inaccessible and remote parts of the western Anti-Atlas belt.…”
    Article
  7. 327

    Unique in the shopping mall: On the reidentifiability of credit card metadata by de Montjoye, Yves-Alexandre, Radaelli, Laura, Singh, Vivek Kumar, Pentland, Alex

    Published 2021
    “…Large-scale data sets of human behavior have the potential to fundamentally transform the way we fight diseases, design cities, or perform research. …”
    Get full text
    Article
  8. 328

    A public relations campaign to promote arts and culture in Singapore in collaboration with Nerf Creative. by Zhang, Yunxi., Tsen, Audrey Si Jia., Tee, Hui Sheng., Cheng, Xin Yi.

    Published 2012
    “…The campaign set out to raise awareness of the toy art culture scene through curated exhibitions amongst PMEBs in Singapore, aged 25 to 40. …”
    Get full text
    Final Year Project (FYP)
  9. 329

    Get a Copy Find a copy in the library Internet of Things and Connected Technologies : Conference Proceedings on 5th International Conference on Internet of Things and Connected Tec... by International Conference on Internet of Things and Connected Technologies (5th : 2020 : Patna City, India), organiser 643049, Misra, Rajiv, editor 643051, Kesswani, Nishtha, editor 643052, Rajarajan, M., editor 643053, Bharadwaj, Veeravalli, editor 643054, Patel, Ashok, editor 643055

    Published [202
    “…This book presents the recent research adoption of a variety of enabling wireless communication technologies like RFID tags, BLE, ZigBee, etc., and embedded sensor and actuator nodes, and various protocols like CoAP, MQTT, DNS, etc., that has made Internet of things (IoT) to step out of its infancy to become smart things. …”
    text
  10. 330

    Does bankruptcy law prevent internalization of environmental costs: evidence from China by Li, Xingwei

    Published 2023
    “…The principle requires those responsible for environmental damage or imminent threats of damage to bear the necessary costs of remediation and prevention. …”
    Get full text
    Get full text
    Article
  11. 331

    Factual approach for tropical forest parameters measurement and monitoring: future option with a focus on synergetic use of airborne and terrestrial lidar technologies by Bazezew, Muluken N., Hussin, Yousif A., Kloosterman, Evert H., M. Hasmadi, Ismail

    Published 2021
    “…This approach contributes to the development of efficient techniques for forest monitoring systems and bears the potential to extend the modelling options from remote sensing data to understory layer trees.…”
    Article
  12. 332

    Atomic structure of the open SARS-CoV-2 E viroporin by Medeiros-Silva, João, Dregni, Aurelio J., Somberg, Noah H., Duan, Pu, Hong, Mei

    Published 2024
    “…Compared to the closed state, open ETM has an expansive water-filled amino-terminal chamber capped by key glutamate and threonine residues, a loose phenylalanine aromatic belt in the middle, and a constricted polar carboxyl-terminal pore filled with an arginine and a threonine residue. …”
    Get full text
    Article
  13. 333

    Proximity device for Covid-19 safe distancing by Ho, Charmaine

    Published 2022
    “…The final design based on functionality comprises ultrasonic and thermal sensors embedded in a belt-like framework and controlled with a microcontroller. …”
    Get full text
    Final Year Project (FYP)
  14. 334

    Photovoltaic energy system with electrical storage by Ong, Han Ern.

    Published 2011
    “…Singapore is situated at the equatorial sun belt that has approximate 12 hours of sunlight in a day. …”
    Get full text
    Final Year Project (FYP)
  15. 335

    Development and simulation of underwater acoustic modem by Song, Ziming

    Published 2024
    “…The modem designed is proved to have satisfactory BER performance against UWA channel without consuming excessive computational power.…”
    Get full text
    Thesis-Master by Coursework
  16. 336

    A generalized framework for fuzzy neural architecture by Tung, Whye Loon.

    Published 2008
    “…Such weaknesses are directly related to the techniques employed for the derivation of the fuzzy sets and IF-THEN fuzzy rules (structural learning), the tuning of the fuzzy sets (parameter-learning) and the choice of fuzzy reasoning/inference scheme used to define the node operations of the systems.…”
    Get full text
    Thesis
  17. 337

    Single and interval valued neutrosophic group decision making problem based on dynamic programming cluster model by Kanchana, A, Nagarajan, D, Jacob, Kavikumar

    Published 2024
    “…Since they cannot be computed directly, the language variables were encoded using single and interval neutrosophic sets. In a real-world context, neutrosophic sets are used to manage indeterminacy. …”
    Get full text
    Article
  18. 338

    Linear A libation tables : a semitic connection explored by Eu Min, Niki Cassandra, Perono Cacciafoco, Francesco, Cavallaro, Francesco Paolo

    Published 2020
    “…Unlike the Linear B language (Mycenaean Greek), Minoan, the language hidden behind Linear A and still undeciphered, bears no apparent similarity to Greek, and any ‘translation’ of Linear A based provisionally on Linear B phonetic values has not produced any tangible result. …”
    Get full text
    Journal Article
  19. 339

    A three-membered diazo-aluminum heterocycle to access an Al=C π bonding species by Yan, Chenting, Kinjo, Rei

    Published 2022
    “…An X-ray study shows that the anionic part of 5 bears a considerable short exocyclic Al-C bond, and computational studies involving molecular orbital and natural bond orbital analysis indicate the Al=C π bonding character. …”
    Get full text
    Journal Article
  20. 340

    Secure image encryption based on an ideal new nonlinear discrete dynamical system by Lin, M. Rongming, Ng, Teng Yong

    Published 2018
    “…Extensive numerical experiment results have revealed that the proposed image encryption algorithm offers advantages of unlimited key space and high-level security, since those problematic periodic windows are no longer present within the key space, and it is extremely robust against known-plain-text attack, since the chaotic sequence generated bears no correlation whatsoever due to the folding effect of modulo operation. …”
    Get full text
    Get full text
    Journal Article