Showing 7,781 - 7,800 results of 7,818 for search '(((cheers OR (cheer OR sheer)) OR (beer OR been)) OR check)*', query time: 0.15s Refine Results
  1. 7781

    Effect of Dactylaria higginsii on interference of Cyperus rotundus with L. esculentum by Kadir, J.B., Charudattan, R., Stall, W.M., Bewick, T.A.

    Published 1999
    “…At 106 conidia ml-1, D. higginsii reduced the interference from C. rotundus, controlled C. rotundus better, and increased L. esculentum yield compared to the weedy checks.…”
    Article
  2. 7782

    Mitigate the effect of distributed generators connected to distribution system. by Oraibi, Saleh Khairullah, Mohamad Idris, Rasyidah

    Published 2022
    “…ETAP program is used for analyzing and checking the results obtained, where the operating time and TMS value of all relays in the system are calculated in case the distribution generators are not connected, and to ensure the quality of coordination by Etap software, then the distributive generators are connected, their effects are studied, and the relays are coordinated again by the two previous methods. …”
    Get full text
    Article
  3. 7783

    Membrane compaction in forward osmosis process by Ng, Daniel Yee Fan, Chen, Yunfeng, Dong, Zhili, Wang, Rong

    Published 2021
    “…The TFC membranes were continuously tested in FO experiments for 24 h by using DI water as feed and NaCl solutions of different concentrations as draw solution, and their performances were checked again using fresh feed solutions. At the end of FO experiments, all TFC membranes experienced water flux and salt flux decline to different extents. …”
    Get full text
    Journal Article
  4. 7784

    Floquet Codes without Parent Subsystem Codes by Davydova, Margarita, Tantivasadakarn, Nathanan, Balasubramanian, Shankar

    Published 2024
    “…However, unlike the honeycomb code, it possesses an explicit CSS structure and its gauge checks do not form a subsystem code. Nevertheless, we show that our dynamic protocol conserves logical information and possesses a threshold for error correction. …”
    Get full text
    Article
  5. 7785
  6. 7786

    Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications by Zyskind, Guy, Yanai, Avishay, Pentland, Alex

    Published 2024
    “…Using that deployment, we showcase the protocols' applicability for two interesting applications, policy checking and wallet exchange, as well as their efficiency by demonstrating low gas costs and fees.…”
    Get full text
    Article
  7. 7787

    Disrupting Monocultural Tendencies through Multimodal Montage by Singha, Mrinalini

    Published 2024
    “…As an Indian artist, the author situates her own practice within this discourse, highlighting projects such as `The Whistleblower' (2023), a tangible archive within an everyday object, and `A Mystery for You' (2023-24), a fact-checking game that merges a tangible interface with a large language model (LLM). …”
    Get full text
    Get full text
    Thesis
  8. 7788

    Towards explainable and semantically coherent claim extraction for an automated fact-checker by Yoswara, Jocelyn Valencia

    Published 2024
    “…Therefore, this project aims to enhance the claim extraction process of an automatic fact-checker, improve the accuracy of fact-checking, and mitigate the limitations associated with LLMs' reliance on outdated information. …”
    Get full text
    Final Year Project (FYP)
  9. 7789

    Three dimensional numerical manifold method and rock engineering applications by He, Lei

    Published 2011
    “…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
    Get full text
    Thesis
  10. 7790

    SCE17-0185: STIX representation of cyber threat intelligence by Phua, Kin Wee

    Published 2018
    “…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
    Get full text
    Final Year Project (FYP)
  11. 7791

    Integration of genetic data and genomic annotation in the analysis of genome wide association studies by Ng, E

    Published 2017
    “…To fine map these loci and assign functional annotation, I created Bayesian credible sets and checked for overlap between SNPs in these credible sets and regulatory marks in the Encyclopaedia of DNA Elements (ENCODE) database. …”
    Thesis
  12. 7792

    Prevalence of sleep disturbance in patients with ankylosing spondylitis: a systematic review and meta-analysis by Salari, Nader, Sadeghi, Narges, Hosseinian-Far, Amin, Hasheminezhad, Razie, Khazaie, Habibolah, Shohaimi, Shamarina, Mohammadi, Masoud

    Published 2023
    “…Heterogeneity among the identified studies was checked using the I2 index, and the Begg and Mazumdar correlation test examined the existence of published bias. …”
    Get full text
    Article
  13. 7793

    A Multi-tier Model and Filtering Approach to Detect Fake News Using Machine Learning Algorithms by Yu, Chiung Chang, A Hamid, Isredza Rahmi, Abdullah, Zubaile, Kipli, Kuryati, Amnur, Hidra

    Published 2024
    “…The best performance of sequence for both datasets is LR_DT_RF which yields 0.9892 F1-Score, 0.9895 Accuracy, and 0.9790 Matthews Correlation Coefficient (MCC) for ISOT Fake News Dataset, and 0.9913 F1-Score, 0.9853 Accuracy, and 0.9455 MCC for CHECKED Dataset. This research could give researchers an approach for fake news detection on different social platforms and feature-based.…”
    Get full text
    Article
  14. 7794

    15.571 Generating Business Value from Information Technology, Spring 2007 by Weill, Peter

    Published 2010
    “…The familiar components of the place: cash, checks, paper reports and documents, store fronts, and face to face meetings remain important, but less so. …”
    Get full text
    Learning Object
  15. 7795

    A multidisciplinary survey of computational techniques for the modelling, simulation and analysis of biochemical networks by Decraene, James, Hinze, Thomas

    Published 2011
    “…From a practical point of view, in silico experiments can be performed that would be very expensive or impossible to achieve in the laboratory, such as hypothesis-testing with regards to knock-out experiments or overexpression, or checking the validity of a proposed molecular mechanism. …”
    Get full text
    Get full text
    Journal Article
  16. 7796

    Greenly prepared antimicrobial cotton fabrics using bioactive agents from Cupressaceae pods by Syed, Murtaza Haider, Mior Ahmad Khushairi, Mohd Zahari, Qutaba, Syed, Norhayati, Abdullah, Syed, Lubna, Abro, Zamir Ahmed

    Published 2022
    “…Finally, the antimicrobial activity of the greenly developed antimicrobial cotton fabrics was checked against Staphylococcus, Escherichia coli, Bacillus and Candida albicans by using the AATCC 100-2004 test method. …”
    Get full text
    Get full text
    Article
  17. 7797

    Identification of electromagnetic pre-earthquake perturbations from the DEMETER data by machine learning by Xiong, Pan, Long, Cheng, Zhou, Huiyu, Battiston, Roberto, Zhang, Xuemin, Shen, Xuhui

    Published 2021
    “…In this paper, we explore 16 spot-checking classification algorithms, among which, the top classifier with low-frequency power spectra of electric and magnetic fields was used for ionospheric perturbation analysis. …”
    Get full text
    Journal Article
  18. 7798

    Mediation effects of language anxiety and prior learning experience on academic speaking challenges and strategies among Libyan students in Malaysian universities by Halali, Ahlam Ali Salim, Ismail, Lilliati, Abd Samad, Arshad, Razali, Abu Bakar, Noordin, Nooreen

    Published 2023
    “…Field notes and member checks were used for validation. Correlational procedures, structural equation modeling (SEM), and bootstrapping resampling analyses were conducted to examine the relationships between variables, validate study models, and test research hypotheses. …”
    Get full text
    Article
  19. 7799
  20. 7800

    Center potential by Tan, Hu Soon

    Published 2023
    “…To ensure the safety and trustworthiness of tutors, this application incorporates a rigorous verification process, which includes background checks, identity verification, and qualification validation. …”
    Get full text
    Final Year Project (FYP)