Showing 301 - 320 results of 6,389 for search '(((ceers OR peer) OR (beers OR bee)) OR check)*', query time: 0.13s Refine Results
  1. 301

    Social tags as news event detectors by Chua, Alton Yeow Kuan, Razikin, Khasfariyati, Goh, Dion Hoe-Lian

    Published 2013
    “…Relative frequencies of the top 200 most frequently-used tags were analysed to check for spikes and bursts. Based on the results, four main findings emerged. …”
    Get full text
    Get full text
    Journal Article
  2. 302

    Development of a mobile app for the thermal design of heat exchangers by Yap, Shi Kai

    Published 2021
    “…These include the fouling calculations and the flow-induced vibration check. The design of a STHE is extremely complicated and is a tedious process with many required calculations. …”
    Get full text
    Final Year Project (FYP)
  3. 303

    Crowd monitoring and detection by Li, Xin

    Published 2022
    “…However, it requires a lot of manpower to check the scanning pass and vaccination status which always lead to a long queue and make social distance hard to maintain. …”
    Get full text
    Final Year Project (FYP)
  4. 304

    Road-network-based rapid geolocalization by Li, Yongfei, Yang, Dongfang, Wang, Shicheng, He, Hao, Hu, Jiaxing, Liu, Huaping

    Published 2022
    “…These matching candidates are first “filtered” with the model consistency check in parameter space and then tested with similarity metrics to identify the correct transformation. …”
    Get full text
    Journal Article
  5. 305

    A fuzzy rough number extended AHP and VIKOR for failure mode and effects analysis under uncertainty by Zhu, Guoniu, Ma, Jin, Hu, Jie

    Published 2022
    “…A practical case study of the check valve is provided to validate the applicability of the proposed FMEA. …”
    Get full text
    Journal Article
  6. 306

    Non-normal distribution of residual flexural strengths of steel fiber reinforced concretes and its impacts on design and conformity assessment by He, Shan, Yang, En-Hua

    Published 2022
    “…The logarithmic transformation provides a practical and convenient approach to design and to check the conformity of log-normally distributed SFRC properties adopting existing criteria. …”
    Get full text
    Journal Article
  7. 307

    CT sigma delta ADC for audio applications by Hnin, Hnin Soe.

    Published 2009
    “…The non-idealities simulation was extensively run to check how much the overall system can take non-idealities behaviors of gain, gain bandwidth, slew-rate and linearity while meeting performance requirements. …”
    Get full text
    Final Year Project (FYP)
  8. 308

    Ten quick tips for ensuring machine learning model validity by Goh, Wilson Wen Bin, Kabir, Mohammad Neamul, Yoo, Sehwan, Wong, Limsoon

    Published 2024
    “…The 10 quick tips described here discuss useful practices on how to check AI/ ML models from 2 perspectives—the user and the developer.…”
    Get full text
    Journal Article
  9. 309

    An ultra low-power precision sample-and-hold circuit for biomedical application by Mah, Sai Lei

    Published 2010
    “…The parameters that were used to check the precision of the S/H circuit are hold pedestal and total harmonic distortion. …”
    Get full text
    Final Year Project (FYP)
  10. 310

    Eye movement feature extraction for driver vigilance classification by Fu, Zhuxuan

    Published 2015
    “…Analysis of variance (ANOVA) test was employed to check if there exist significant differences among three stages within one driving period. …”
    Get full text
    Final Year Project (FYP)
  11. 311

    Design of a hybrid neural spike detection algorithm for implantable integrated brain circuits by Zeinolabedin, Seyed Mohammad Ali, Do, Anh Tuan, Yeo, Kiat Seng, Kim, Tony Tae-Hyoung

    Published 2016
    “…Once a potential spike is detected, NEO is executed to check whether the detected spike by absolute thresholding is valid. …”
    Get full text
    Get full text
    Conference Paper
  12. 312

    Petri net-based efficient determination of optimal schedules for transport-dominant single-arm multi-cluster tools by Yang, Fajun, Wu, Naiqi, Qiao, Yan, Zhou, Mengchu, Su, Rong., Qu, Ting

    Published 2018
    “…Thereafter, an efficient algorithm is developed to check the given conditions and find such a schedule efficiently if existing. …”
    Get full text
    Get full text
    Journal Article
  13. 313

    PEIGEN – a platform for evaluation, implementation, and generation of S-boxes by Sasaki, Yu, Ling, San, Guo, Jian, Bao, Zhenzhen

    Published 2019
    “…PEIGEN is aimed to be a platform covering a comprehensive check-list of design criteria of S-boxes appearing in the literature. …”
    Get full text
    Get full text
    Journal Article
  14. 314

    Experimental results of bispectral invariants discriminative power by Kubicki, Karol., Kakarala, Ramakrishna.

    Published 2013
    “…However, insufficient research has been conducted to check their behavior in practice. In this paper, results are presented pertaining to the discriminative power of bispectral invariants. …”
    Get full text
    Get full text
    Conference Paper
  15. 315

    A signal through the noise: accurate determination of hydrogen atom positions in crystal structures and optimisation of Laue neutron diffraction methods by Sackman, GA

    Published 2021
    “…This focuses on:</p> <p>Recommendations for the efficient collection of Laue neutron data, in order to optimise the data set completeness and awarded beam-time; strategic considerations for how to best answer the scientific question(s) at hand in a Laue neutron experiment, whilst planning against future contingencies; improving methods for crystal packing and shipping, particularly for air and moisture sensitive materials; discussing issues arising from ice forming on the crystal during a Laue neutron diffraction experiment, and methods for minimising this problem; more effectively modelling disorder using ring shapes, in the crystallographic refinement package CRYSTALS; providing rationale for Laue neutron specific checkCIF comments.</p> <p>Alongside the aforementioned research projects, the relevant history and theory contextualising the crystallographic methods used is presented.…”
    Thesis
  16. 316

    A random-key genetic algorithm-based method for transportation network vulnerability envelope analysis under simultaneous multi-link disruptions by Gu, Y, Ryu, S, Xu, Y, Chen, A, Chan, H-Y, Xu, X

    Published 2024
    “…Specifically, the TNVE problem can be formulated as a binary integer bi-level program (BLP), in which the upper-level problem maximizes/minimizes the remaining network performance under a given number of disrupted links, and the lower-level problem adopts the shortest path problem to check the post-disruption connectivity of each origin–destination (O-D) pair while circumventing the cumbersome path enumeration or path set pre-generation. …”
    Journal article
  17. 317

    Effect of consumers' awareness about country of origin on purchasing decision in Klang Valley, Malaysia by Taheri, Nasim

    Published 2015
    “…The accumulated information was examined with care to double check the accuracy using SPSS. The data collected was analysed using descriptive analysis, cross-tabulation analysis, factor analysis and multiple regression analysis. …”
    Get full text
    Thesis
  18. 318
  19. 319

    What information really matters in supervisor reduction? by Su, Rong, Wonham, Walter Murray

    Published 2020
    “…One strategy is to reduce the size of a supervisor to generate a control equivalent version, whose size is optimistically much smaller than the original one so that a user or control designer can easily check whether a designed controller fulfils its objectives and requirements. …”
    Get full text
    Journal Article
  20. 320

    A 4D imaging radar SLAM system for large-scale environments based on pose graph optimization by Zhuge, Huayang

    Published 2023
    “…This work proposes a full system for 4D Radar SLAM consisting of three modules: 1) Front-end module performs scan-to-scan matching to calculate the odometry based on GICP, considering the probability distribution of each point; 2) Loop detection utilizes multiple rule-based loop pre-filtering steps, followed by an intensity scan context step to identify loop candidates, and odometry check to reject false loop; 3) Back-end builds a pose graph using front-end odometry, loop closure, and optional GPS data. …”
    Get full text
    Thesis-Master by Coursework