Search alternatives:
checkers » checker (Expand Search), checked (Expand Search), crackers (Expand Search)
hackers » trackers (Expand Search)
beer » peer (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), crackers (Expand Search)
hackers » trackers (Expand Search)
beer » peer (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
-
461
Structural behavior of tubular frame under elevated temperature
Published 2009“…In this study, a two-bay-two-floor steel tubular frame, separated as four individual compartments, was modeled to investigate the behaviour of tubular frame under transient elevated temperature. To bear a resemblance to real fire condition, transient elevated temperature analysis was run to provide a more realistic solution. …”
Get full text
Final Year Project (FYP) -
462
PLATON: top-down R-tree packing with learned partition policy
Published 2024Get full text
Get full text
Get full text
Conference Paper -
463
Transverse momentum-dependent heavy-quark fragmentation at next-to-leading order
Published 2024“…Our final results in position space agree with those of a recent calculation by another group that used a highly orthogonal organization of singularities in the intermediate momentum-space steps, providing a strong independent cross check. As an immediate application, we present the complete quark mass dependence of the energy-energy correlator (EEC) in the back-to-back limit at (𝛼𝑠).…”
Get full text
Article -
464
Social tags as news event detectors
Published 2013“…Relative frequencies of the top 200 most frequently-used tags were analysed to check for spikes and bursts. Based on the results, four main findings emerged. …”
Get full text
Get full text
Journal Article -
465
A fuzzy rough number extended AHP and VIKOR for failure mode and effects analysis under uncertainty
Published 2022“…A practical case study of the check valve is provided to validate the applicability of the proposed FMEA. …”
Get full text
Journal Article -
466
CT sigma delta ADC for audio applications
Published 2009“…The non-idealities simulation was extensively run to check how much the overall system can take non-idealities behaviors of gain, gain bandwidth, slew-rate and linearity while meeting performance requirements. …”
Get full text
Final Year Project (FYP) -
467
An ultra low-power precision sample-and-hold circuit for biomedical application
Published 2010“…The parameters that were used to check the precision of the S/H circuit are hold pedestal and total harmonic distortion. …”
Get full text
Final Year Project (FYP) -
468
Eye movement feature extraction for driver vigilance classification
Published 2015“…Analysis of variance (ANOVA) test was employed to check if there exist significant differences among three stages within one driving period. …”
Get full text
Final Year Project (FYP) -
469
A signal through the noise: accurate determination of hydrogen atom positions in crystal structures and optimisation of Laue neutron diffraction methods
Published 2021“…This focuses on:</p> <p>Recommendations for the efficient collection of Laue neutron data, in order to optimise the data set completeness and awarded beam-time; strategic considerations for how to best answer the scientific question(s) at hand in a Laue neutron experiment, whilst planning against future contingencies; improving methods for crystal packing and shipping, particularly for air and moisture sensitive materials; discussing issues arising from ice forming on the crystal during a Laue neutron diffraction experiment, and methods for minimising this problem; more effectively modelling disorder using ring shapes, in the crystallographic refinement package CRYSTALS; providing rationale for Laue neutron specific checkCIF comments.</p> <p>Alongside the aforementioned research projects, the relevant history and theory contextualising the crystallographic methods used is presented.…”
Thesis -
470
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…SA-EADC adds another phase as “sensor redundancy check and activation” to EADC. It identifies the redundant sensor nodes, whose sensing coverage area are also covered completely by their direct neighbors and turns off them. …”
Get full text
Thesis -
471
BEM-PSP for single-carrier and SC-FDMA communication over a doubly selective fading channel
Published 2023“…The resultant BEM-PSP receiver significantly improves the channel estimation mean square error (MSE) and the bit error rates (BER) performance in fast fading multi-path channel, thanks to the channel tracking capability embedded within its Viterbi equalizer. …”
Get full text
Journal Article -
472
Applications of deep learning for physical layer of wireless communication systems
Published 2024“…The 1D-TRNet receiver outperforms traditional OFDM receivers and state-of-the-art generalized approximate message passing (GAMP) receivers in terms of bit-error rate (BER) performance. The third research work proposes a deep learning-based 5G receiver, named communication transformer network (Comm-Trans Net), which is designed to be robust for different sub-types of TDL channels. …”
Get full text
Thesis-Doctor of Philosophy -
473
21W.745 / SP.576J / WGS.576J Advanced Essay Workshop, Spring 2005
Published 2005Get full text
Learning Object -
474
Analysis and design of RSSI in the RF receiver chain
Published 2018“…This dissertation presents the CMOS design of such a RSSI block implemented in the RF receiver chain, which is used in low-power applications such as BLE or ZigBee. IFA and rectifiers form the basic building blocks of RSSI that are constructed with much care in this design. …”
Get full text
Thesis -
475
TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform
Published 2025“…The initial phase will check four segments to determine the tampered bit or not. …”
Get full text
Article -
476
A comparative analysis of ENCODE and Cistrome in the context of TF binding signal
Published 2024“…Moreover, the output format of the processing (BED narrowPeak) exposes a feature, the signalValue, which is seldom used in consistency checks, but can offer valuable insight on the quality of the data. …”
Get full text
Journal Article -
477
Implementation of occupational safety and health management system in reducing ergonomic risk among certified and uncertified automotive industry workers
Published 2015“…Data was collected by using a questionnaire survey, which was adopted from MSOSH and was integrated with the Nordic Questionnaire for MSD and the workers were also observed using the Quick Exposure Check (QEC) guidelines among 400 workers in both OSHMS certified and uncertified automotive industries located in Klang Valley, Malaysia. …”
Get full text
Thesis -
478
Optimized code design for constrained DNA data storage with asymmetric errors
Published 2019“…A hybrid coding architecture consisting of modified variable-length run-length limited (VL-RLL) codes and optimized protograph low-density parity-check (LDPC) codes is proposed in order to suppress error occurrence and correct asymmetric substitution errors. …”
Get full text
Get full text
Journal Article -
479
Community health workers: efficacy, taxonomy, and performance
Published 2016“…</p> <p><b>Conclusion:</b> In bringing the tools of evidence based practice to bear on community health worker interventions, this dissertation has contributed to the theoretical, methodological, and empirical evidence base from which the field can continue to advance.…”
Thesis -
480
Improved thermomechanical and viscoelasticity properties of bio-epoxy/date palm fiber composite by addition of eggshell particles
Published 2023“…This research aims to check the influent of ES filler on thermal and viscoelasticity properties of bio-epoxy composite with incorporation of 40 wt.% date palm (DP) fiber. …”
Get full text
Article