Search alternatives:
ceres » cereus (Expand Search), cores (Expand Search), cares (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), hackers (Expand Search)
bears » years (Expand Search), beams (Expand Search), bear (Expand Search)
beer » been (Expand Search), bee (Expand Search), bear (Expand Search)
ceres » cereus (Expand Search), cores (Expand Search), cares (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), hackers (Expand Search)
bears » years (Expand Search), beams (Expand Search), bear (Expand Search)
beer » been (Expand Search), bee (Expand Search), bear (Expand Search)
-
6301
-
6302
-
6303
Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications
Published 2024“…Using that deployment, we showcase the protocols' applicability for two interesting applications, policy checking and wallet exchange, as well as their efficiency by demonstrating low gas costs and fees.…”
Get full text
Article -
6304
Disrupting Monocultural Tendencies through Multimodal Montage
Published 2024“…As an Indian artist, the author situates her own practice within this discourse, highlighting projects such as `The Whistleblower' (2023), a tangible archive within an everyday object, and `A Mystery for You' (2023-24), a fact-checking game that merges a tangible interface with a large language model (LLM). …”
Get full text
Get full text
Thesis -
6305
Online game for Chinese chess
Published 2010“…Research from various sources such as internet, books and journals was done to enhance in understanding of the development of an online Chinese Chess game.The results had indicated that a simple move of a chess piece involves a lot of checking and consideration on the types of moves possible. …”
Get full text
Final Year Project (FYP) -
6306
Three dimensional numerical manifold method and rock engineering applications
Published 2011“…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
Get full text
Thesis -
6307
SCE17-0185: STIX representation of cyber threat intelligence
Published 2018“…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
Get full text
Final Year Project (FYP) -
6308
Integration of genetic data and genomic annotation in the analysis of genome wide association studies
Published 2017“…To fine map these loci and assign functional annotation, I created Bayesian credible sets and checked for overlap between SNPs in these credible sets and regulatory marks in the Encyclopaedia of DNA Elements (ENCODE) database. …”
Thesis -
6309
A multidisciplinary survey of computational techniques for the modelling, simulation and analysis of biochemical networks
Published 2011“…From a practical point of view, in silico experiments can be performed that would be very expensive or impossible to achieve in the laboratory, such as hypothesis-testing with regards to knock-out experiments or overexpression, or checking the validity of a proposed molecular mechanism. …”
Get full text
Get full text
Journal Article -
6310
On the corrosion resistance of some selective laser melted alloys
Published 2021“…The effects of laser scanning strategy (single melt vs. checker board styles), post-SLM heat treatment, and corroding surface orientation (with respect to the scan and build directions) on the corrosion behavior were examined. …”
Get full text
Journal Article -
6311
Minimal power manoeuvring techniques in nano-satellites
Published 2016“…The first idea focuses on moving a ball bearing in a tube while the second idea is about moving a ball bearing on a wooden board. …”
Get full text
Final Year Project (FYP) -
6312
GPU-accelerated real-time motion planning for safe human-robot collaboration
Published 2024“…We experimentally demonstrate that our method can navigate a 6-DoF robot earlier than a geometric-primitives-based distance checker in a dynamic, collaborative environment. …”
Get full text
Thesis-Doctor of Philosophy -
6313
Stabilization/solidification of Mn-contaminated clay slurry by using CaO-GGBS: effects of anions
Published 2023“…Therefore, this study investigated the S/S efficiency of CaO-GGBS in treating MnSO4-bearing and Mn(NO3)2-bearing clay slurries. The effect of anions (i.e. …”
Get full text
Journal Article -
6314
Identification of electromagnetic pre-earthquake perturbations from the DEMETER data by machine learning
Published 2021“…In this paper, we explore 16 spot-checking classification algorithms, among which, the top classifier with low-frequency power spectra of electric and magnetic fields was used for ionospheric perturbation analysis. …”
Get full text
Journal Article -
6315
AI-ML for quantitative blood pressure and blood glucose estimation from non-occlusive PPG/ECG bio-signals
Published 2023“…Even though this disease affects more than 500 million individuals, there is a lack of non-invasive methods for checking glucose levels, making the use of a glucometer with finger pricking the most common and reliable option for daily glucose testing in personal healthcare. …”
Get full text
Final Year Project (FYP) -
6316
The effects of angiotensin-receptor blockade on mood and vigilance behaviour in a gamified foraging task
Published 2023“…We therefore suggest that losartan may act anxiolytically to reduce threat-related worries and increase vigilant checking behaviours. This supports suggestions that losartan may be useful as an adjunct to exposure therapy, acting synergistically to improve clinical outcomes. …”
Thesis -
6317
Determination of the local surface shapes on the foot surface from plantar view using surface curvature and colour scale for shape categories
Published 2008“…Two conditions of feet were scanned: weight bearing condition and non-weight bearing condition.…”
Get full text
Thesis -
6318
Security for automotive electrical/electronic (E/E) architectures
Published 2018“…SAAN uses probabilistic model checking to calculate the security of automotive networks, based on the architecture and expert evaluations of components. …”
Get full text
Get full text
Thesis -
6319
-
6320
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies
Published 2025Get full text
Article