Search alternatives:
ceers » cheers (Expand Search), cers (Expand Search)
beers » bears (Expand Search), bees (Expand Search), bers (Expand Search), beens (Expand Search), peers (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
peers » peer (Expand Search)
ceers » cheers (Expand Search), cers (Expand Search)
beers » bears (Expand Search), bees (Expand Search), bers (Expand Search), beens (Expand Search), peers (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
peers » peer (Expand Search)
-
261
Abelian codes in principal ideal group algebras
Published 2013“…For abelian codes in a PIGA, which can be viewed as cyclic codes over a semisimple group algebra, it is shown that every abelian code in a PIGA admits generator and check elements. These are analogous to the generator and parity-check polynomials of cyclic codes. …”
Get full text
Get full text
Get full text
Journal Article -
262
The effects of instructional and motivational self-talk on vertical jump performance and kinematics
Published 2019“…After each trail, participants were put through a manipulation check to assess adherence to self-talk conditions. …”
Get full text
Final Year Project (FYP) -
263
Fintech renaissance: powering efficiency in Asian banking through country competitiveness
Published 2024“…The panel data regression utilized a fixed-effect model, which was run after a diagnostic check. The validated data satisfied the criteria for stationary, serial autocorrelation, heteroscedasticity, homogeneity, and multicollinearity. …”
Get full text
Article -
264
Synthesis of metal-organic framework membranes
Published 2013“…The use of organic linkers also presents the potential for the design of different functional groups, which would allow for many different applications. [3rd Award]-[Peer Assessment Review]…”
Get full text
Get full text
Student Research Poster -
265
P4-network : a networking infrastructure for intra-aircraft cabin wireless communication
Published 2009“…The project focuses on peer-to-peer communication schemes, and en-compasses the use of redundant communication paths as a method to address the problem of line-of-sight blocking. …”
Get full text
Final Year Project (FYP) -
266
A boundary element approach for solving plane elastostatic equations of anisotropic functionally graded materials
Published 2021“…The proposed boundary element method is applied to solve some specific problems to check its validity and accuracy.…”
Get full text
Journal Article -
267
Ten quick tips for ensuring machine learning model validity
Published 2024“…The 10 quick tips described here discuss useful practices on how to check AI/ ML models from 2 perspectives—the user and the developer.…”
Get full text
Journal Article -
268
Automated shielding effectiveness test system for shielded enclosures
Published 2010“…Such shielding effectiveness tests check whether an enclosure is sufficiently shielded from external electromagnetic interference. …”
Get full text
Thesis -
269
Bio-based lubricant with additives: Tribological performances in hydrodynamic journal bearing
Published 2024“…The performance of this treated BBL was evaluated in a hydrodynamic JB. Peer review: The peer review history for this article is available at: https://publons.com/publon/10.1108/ILT-11-2023-0363/.…”
Article -
270
Prediction algorithms for the financial markets
Published 2013“…These two parts will be integrated at the end. [Peer Assessment Review]…”
Get full text
Get full text
Student Research Poster -
271
Effect of Dactylaria higginsii on interference of Cyperus rotundus with L. esculentum
Published 1999“…At 106 conidia ml-1, D. higginsii reduced the interference from C. rotundus, controlled C. rotundus better, and increased L. esculentum yield compared to the weedy checks.…”
Article -
272
Mitigate the effect of distributed generators connected to distribution system.
Published 2022“…ETAP program is used for analyzing and checking the results obtained, where the operating time and TMS value of all relays in the system are calculated in case the distribution generators are not connected, and to ensure the quality of coordination by Etap software, then the distributive generators are connected, their effects are studied, and the relays are coordinated again by the two previous methods. …”
Get full text
Article -
273
Effective 5D BIM requirements for risk mitigation during pre-contract stage.
Published 2022“…Risk mitigation strategies are proposed to make a positive impact on the 5D BIM implementation, which consist of regular checks and balances, improve skills and knowledge through training and acquire suitable 5D BIM applications. …”
Get full text
Article -
274
Experimental investigation on working of PCR chip
Published 2014“…This project puts together all these best practices and comes out with a series of check list cum factors to prepare a working chip and present to the reader, means of incorrect as well as correct operation of successful chip making and working which is necessary for DNA analysis. …”
Get full text
Final Year Project (FYP) -
275
Human Centered Computing : 66th International Conference, HCC 2020, Virtual Event, December 14-15, 2020 : Revised Selected Papers /
Published [202“…The conference focuses on the following three main themes as follows: Data such as Data Visualization, Big Data, Data Security, Hyper connectivity such as Internet of Things, Cloud Computing, Mobile Network and Collaboration such as Collective Intelligence, Peer Production, Context Awareness and much more.…”
text -
276
Imaging fiber design for medical applications
Published 2013“…Secondly, it decreases the loss by using periodic microstructures within photonic crystal fibers (PCFs) as well as alternating layers (n1/n2) of dielectrics deposited on a metal film inside the hollow core. [Peer Assessment Review]…”
Get full text
Get full text
Student Research Poster -
277
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…SA-EADC adds another phase as “sensor redundancy check and activation” to EADC. It identifies the redundant sensor nodes, whose sensing coverage area are also covered completely by their direct neighbors and turns off them. …”
Get full text
Thesis -
278
Blind detection of interlever parameters for block and convolutional coded sequences
Published 2012“…Channel encoding is implemented in most digital communications to combat transmission errors, which is achieved by adding additional parity check bits to the data stream. However, channel encoder will not be able to handle the effects of fading or burst errors. …”
Get full text
Final Year Project (FYP) -
279
Design and implementation of a synthesizable test-bench for testing the LDPC decoder IP
Published 2018“…The simulation environment is mainly used for preliminary and functional checks, and the emulation environment is chosen for further verification due to its much higher run speed compared to simulation.…”
Get full text
Thesis -
280
Counterexample computation in compositional nonblocking verification
Published 2018“…Counterexamples are an important feature of model checking that explains the cause of a detected problem, greatly helping users to understand and fix faults. …”
Get full text
Get full text
Journal Article