Showing 6,241 - 6,260 results of 6,499 for search '(((checkeds OR (checker OR checked)) OR bear) OR peer)*', query time: 0.13s Refine Results
  1. 6241

    Eye movement feature extraction for driver vigilance classification by Fu, Zhuxuan

    Published 2015
    “…Analysis of variance (ANOVA) test was employed to check if there exist significant differences among three stages within one driving period. …”
    Get full text
    Final Year Project (FYP)
  2. 6242

    SCE17-0185: STIX representation of cyber threat intelligence by Phua, Kin Wee

    Published 2018
    “…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
    Get full text
    Final Year Project (FYP)
  3. 6243

    A signal through the noise: accurate determination of hydrogen atom positions in crystal structures and optimisation of Laue neutron diffraction methods by Sackman, GA

    Published 2021
    “…This focuses on:</p> <p>Recommendations for the efficient collection of Laue neutron data, in order to optimise the data set completeness and awarded beam-time; strategic considerations for how to best answer the scientific question(s) at hand in a Laue neutron experiment, whilst planning against future contingencies; improving methods for crystal packing and shipping, particularly for air and moisture sensitive materials; discussing issues arising from ice forming on the crystal during a Laue neutron diffraction experiment, and methods for minimising this problem; more effectively modelling disorder using ring shapes, in the crystallographic refinement package CRYSTALS; providing rationale for Laue neutron specific checkCIF comments.</p> <p>Alongside the aforementioned research projects, the relevant history and theory contextualising the crystallographic methods used is presented.…”
    Thesis
  4. 6244

    A random-key genetic algorithm-based method for transportation network vulnerability envelope analysis under simultaneous multi-link disruptions by Gu, Y, Ryu, S, Xu, Y, Chen, A, Chan, H-Y, Xu, X

    Published 2024
    “…Specifically, the TNVE problem can be formulated as a binary integer bi-level program (BLP), in which the upper-level problem maximizes/minimizes the remaining network performance under a given number of disrupted links, and the lower-level problem adopts the shortest path problem to check the post-disruption connectivity of each origin–destination (O-D) pair while circumventing the cumbersome path enumeration or path set pre-generation. …”
    Journal article
  5. 6245

    15.571 Generating Business Value from Information Technology, Spring 2007 by Weill, Peter

    Published 2010
    “…The familiar components of the place: cash, checks, paper reports and documents, store fronts, and face to face meetings remain important, but less so. …”
    Get full text
    Learning Object
  6. 6246

    A multidisciplinary survey of computational techniques for the modelling, simulation and analysis of biochemical networks by Decraene, James, Hinze, Thomas

    Published 2011
    “…From a practical point of view, in silico experiments can be performed that would be very expensive or impossible to achieve in the laboratory, such as hypothesis-testing with regards to knock-out experiments or overexpression, or checking the validity of a proposed molecular mechanism. …”
    Get full text
    Get full text
    Journal Article
  7. 6247

    Comparing analytical, micromagnetic and statistical channel models at 4 Tcbpsi patterned media recording by Cai, Kui, Elidrissi, Moulay Rachid, Eason, Kwaku, Chan, Kheong Sann, Goh, Wang Ling, Chua, M., Zhang, S. H., Qin, Z. L., Chai, K. S., Tan, K. P., Dong, Y., Victora, R. H.

    Published 2013
    “…In this work, we adapt the GFP model for BPMR and perform a comparison between densities predicted via the analytical and GFP models, by processing the signals from these models with the appropriate detectors and LDPC (low density parity check) decoders.…”
    Get full text
    Get full text
    Journal Article
  8. 6248

    Minimal power manoeuvring techniques in nano-satellites by Lim, Noel Wei Shen

    Published 2016
    “…The first idea focuses on moving a ball bearing in a tube while the second idea is about moving a ball bearing on a wooden board. …”
    Get full text
    Final Year Project (FYP)
  9. 6249

    Stabilization/solidification of Mn-contaminated clay slurry by using CaO-GGBS: effects of anions by Li, Wentao, Yi, Yaolin

    Published 2023
    “…Therefore, this study investigated the S/S efficiency of CaO-GGBS in treating MnSO4-bearing and Mn(NO3)2-bearing clay slurries. The effect of anions (i.e. …”
    Get full text
    Journal Article
  10. 6250

    Identification of electromagnetic pre-earthquake perturbations from the DEMETER data by machine learning by Xiong, Pan, Long, Cheng, Zhou, Huiyu, Battiston, Roberto, Zhang, Xuemin, Shen, Xuhui

    Published 2021
    “…In this paper, we explore 16 spot-checking classification algorithms, among which, the top classifier with low-frequency power spectra of electric and magnetic fields was used for ionospheric perturbation analysis. …”
    Get full text
    Journal Article
  11. 6251
  12. 6252

    What information really matters in supervisor reduction? by Su, Rong, Wonham, Walter Murray

    Published 2020
    “…One strategy is to reduce the size of a supervisor to generate a control equivalent version, whose size is optimistically much smaller than the original one so that a user or control designer can easily check whether a designed controller fulfils its objectives and requirements. …”
    Get full text
    Journal Article
  13. 6253

    A 4D imaging radar SLAM system for large-scale environments based on pose graph optimization by Zhuge, Huayang

    Published 2023
    “…This work proposes a full system for 4D Radar SLAM consisting of three modules: 1) Front-end module performs scan-to-scan matching to calculate the odometry based on GICP, considering the probability distribution of each point; 2) Loop detection utilizes multiple rule-based loop pre-filtering steps, followed by an intensity scan context step to identify loop candidates, and odometry check to reject false loop; 3) Back-end builds a pose graph using front-end odometry, loop closure, and optional GPS data. …”
    Get full text
    Thesis-Master by Coursework
  14. 6254

    Center potential by Tan, Hu Soon

    Published 2023
    “…To ensure the safety and trustworthiness of tutors, this application incorporates a rigorous verification process, which includes background checks, identity verification, and qualification validation. …”
    Get full text
    Final Year Project (FYP)
  15. 6255

    AI-ML for quantitative blood pressure and blood glucose estimation from non-occlusive PPG/ECG bio-signals by Vignesh Sujith Menon

    Published 2023
    “…Even though this disease affects more than 500 million individuals, there is a lack of non-invasive methods for checking glucose levels, making the use of a glucometer with finger pricking the most common and reliable option for daily glucose testing in personal healthcare. …”
    Get full text
    Final Year Project (FYP)
  16. 6256

    Application development on an Android smart-phone by Udit Batra

    Published 2012
    “…The application intercepts all incoming messages and checks them for a certain password which uniquely identifies the owner. …”
    Get full text
    Final Year Project (FYP)
  17. 6257

    Possibility study of in-situ aeration on lorong halus dumping site by Teng, Esther Yuan Yi.

    Published 2012
    “…GS21 was used to assess the reactivity of waste and check the degree of stabilization of LHDG. RI4 was being carried out to determine whether the biodegradation of waste prefers to take place under aerobic conditions. …”
    Get full text
    Final Year Project (FYP)
  18. 6258

    Boundary element methods for axisymmetric heat conduction and thermoelastic deformations in nonhomogeneous solids by Yun, Bao Ing

    Published 2013
    “…Unlike the real boundary element approach for axisymmetric problems, the complex variable approach does not require the evaluation of complicated fundamental solutions involving elliptic integrals. To check the validity of all the boundary element procedures, they are applied to solve specific problems with known analytical solutions. …”
    Get full text
    Thesis
  19. 6259

    Encoding and decoding of serially concatenated codes for data storage systems by Yin, Ke.

    Published 2013
    “…The outer code of the SCC can be a high-rate convolutional code, or a low-density parity-check (LDPC) code; while the inner code normally takes the form of the accumulate code or a high-rate recursive convolutional code (RSC). …”
    Get full text
    Final Year Project (FYP)
  20. 6260

    Unveiling the future of budget hotels in Singapore by Chua, Hwee Lian, Kew, Wong Yip, Soh, Wee Li

    Published 2014
    “…These include using Porter's five forces model to define the external environment in which budget hotels operate and a SWOT analysis to function as an internal check. The findings of this study point towards a shortage of budget hotels that is likely to persist till 1995. …”
    Get full text
    Final Year Project (FYP)