Search alternatives:
beers » bears (Expand Search), bees (Expand Search), bers (Expand Search), beens (Expand Search)
beer » been (Expand Search), bee (Expand Search), bear (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), hackers (Expand Search)
checks » check (Expand Search)
beers » bears (Expand Search), bees (Expand Search), bers (Expand Search), beens (Expand Search)
beer » been (Expand Search), bee (Expand Search), bear (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), hackers (Expand Search)
checks » check (Expand Search)
-
141
Experiences of recreational running among persons with visual impairment (VI) in Singapore
Published 2022“…Among the limited research, it is known that people living with sensory impairments in Singapore were more likely to engage in insufficient PA than their peers. The purpose of this study is to explore the experiences of recreational running as a form of PA among individuals with VI in Singapore. …”
Get full text
Final Year Project (FYP) -
142
Android apps development for image/video processing - (B)
Published 2023“…In addition, users can easily share their edited images with their peers on social media platforms at their fingertips. …”
Get full text
Final Year Project (FYP) -
143
Secure and secret cooperation in robotic swarms
Published 2021“…We propose a system where robots in a swarm, to cooperate towards mission completion, have to "prove" their integrity to their peers by exchanging cryptographic proofs. We show the implications of this approach for two different swarm robotics missions: foraging and maze formation. …”
Get full text
Get full text
Article -
144
Secure and secret cooperation in robot swarms
Published 2021“…We propose a system where robots in a swarm, to cooperate toward mission completion, have to “prove” their integrity to their peers by exchanging cryptographic proofs. We show the implications of this approach for two different swarm robotics missions: foraging and maze formation. …”
Get full text
Article -
145
The Importance of Bystanders in Threat Assessment and Management
Published 2025“…Numerous studies of targeted violence (e.g., mass shootings and school shootings), have demonstrated that peers and bystanders often have knowledge of an attacker’s intentions, concerning communication, and troubling behavior before the attack occurs. …”
Get full text
Book chapter -
146
Blockchain for RegTech: streamlining know your customer (KYC) pipelines
Published 2022“…With Decentralised Finance being developed to replace traditional financial services and transactions of virtual land being conducted on the Metaverse, these ecosystems often involve large amounts of money and require regulatory compliance checks. This calls for a solution that can interoperate effectively with these emerging technologies. …”
Get full text
Final Year Project (FYP) -
147
The midlife crisis
Published 2022“…Instead the paper uses panel and through-time data on, in total, approximately 500,000 individuals. It checks that the key results are not due to cohort effects. …”
Get full text
Get full text
Journal Article -
148
Flexible optical fiber probe for surface roughness evaluation of internal channels in additively manufactured components
Published 2018“…However, being a stochastic process, there is minimal control over the surface quality and thus require adequate quality checks before implementation. In this context, this paper investigates a flexible optical fiber probe and speckle correlation measurements to quantitatively estimate the average surface roughness, Ra, of areas within internal channels. …”
Get full text
Get full text
Conference Paper -
149
Perennial semantic data terms of use for decentralized web
Published 2024“…This constitutes a “perennial” DToU language, where the policy authoring only occurs once, and we can conduct ongoing automated checks across users, applications and activity cycles. …”
Conference item -
150
“I really need your help with this work..”: A System for Navigating the Tricky Terrain of Managing Up by Leveraging One’s Motivation to Get Things Done
Published 2024“…When people need help from their supervisors or peers, they often have to manage up to get things done. …”
Get full text
Article -
151
Floquet Codes without Parent Subsystem Codes
Published 2024“…However, unlike the honeycomb code, it possesses an explicit CSS structure and its gauge checks do not form a subsystem code. Nevertheless, we show that our dynamic protocol conserves logical information and possesses a threshold for error correction. …”
Get full text
Article -
152
Mobile application for optical character recognition (OCR) of digits
Published 2021“…To further improve the recognition accuracy, an API is created for sanity checks based on the domain knowledge adopted from clinicians. …”
Get full text
Final Year Project (FYP) -
153
Dataset on genetic and physiological adults׳ responses to social distress
Published 2018“…Self-reported questionnaires were used to evaluate participants’ interactional patterns towards peers (Attachment Style Questionnaire, Feeney et al., 1994[1]), and the quality of bond with intimate partners (Experiences in Close Relationships Scale, Fraley et al., 2000 [2]). …”
Get full text
Get full text
Journal Article -
154
A Performance Analysis between Conventional and Shariah Private Retirement Scheme in Malaysia (S/O 14551)
Published 2021“…They do not only beat the market over the period, but also strive against the peers ferociously to attain the objective and the interest of fund holders for a better protection of future retirement. …”
Get full text
Monograph -
155
'Women in an extraordinary time': the transnational network and educational spaces of the Canadian Eiwa Girls' mission schools in 1920s and 1930s Japan
Published 2021“…Through network development, physical and intellectual spatial construction, and curriculum and activity design, these historical actors reached outside their institutions to actively connect themselves and their peers with the wider world. In the 1930s, this appears to have been conducted with a sense of urgency. …”
Thesis -
156
-
157
Center potential
Published 2023“…To ensure the safety and trustworthiness of tutors, this application incorporates a rigorous verification process, which includes background checks, identity verification, and qualification validation. …”
Get full text
Final Year Project (FYP) -
158
Application development on an Android smart-phone
Published 2012“…The application intercepts all incoming messages and checks them for a certain password which uniquely identifies the owner. …”
Get full text
Final Year Project (FYP) -
159
Evaluation and fabrication of damaged composite material using non-destructive testing
Published 2019“…Since composites are extensively employed in many areas, it is important to determine the existence of surface and sub-surface defects before production and during regular maintenance checks. As time goes on, wear and tear occur to a material. …”
Get full text
Final Year Project (FYP) -
160
Experiences, perceptions and ethical considerations of the malaria infection study in Thailand
Published 2025“…We found that although compensation was a motivation for participation, this was secondary to it being beneficial to self (health checks; link to health networks; building merit) and others (medical research contribution; altruism). …”
Journal article