Search alternatives:
cheers » cheer (Expand Search), checkers (Expand Search)
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
cheers » cheer (Expand Search), checkers (Expand Search)
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
-
7781
Towards explainable and semantically coherent claim extraction for an automated fact-checker
Published 2024“…Therefore, this project aims to enhance the claim extraction process of an automatic fact-checker, improve the accuracy of fact-checking, and mitigate the limitations associated with LLMs' reliance on outdated information. …”
Get full text
Final Year Project (FYP) -
7782
Three dimensional numerical manifold method and rock engineering applications
Published 2011“…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
Get full text
Thesis -
7783
SCE17-0185: STIX representation of cyber threat intelligence
Published 2018“…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
Get full text
Final Year Project (FYP) -
7784
Integration of genetic data and genomic annotation in the analysis of genome wide association studies
Published 2017“…To fine map these loci and assign functional annotation, I created Bayesian credible sets and checked for overlap between SNPs in these credible sets and regulatory marks in the Encyclopaedia of DNA Elements (ENCODE) database. …”
Thesis -
7785
Prevalence of sleep disturbance in patients with ankylosing spondylitis: a systematic review and meta-analysis
Published 2023“…Heterogeneity among the identified studies was checked using the I2 index, and the Begg and Mazumdar correlation test examined the existence of published bias. …”
Get full text
Article -
7786
A Multi-tier Model and Filtering Approach to Detect Fake News Using Machine Learning Algorithms
Published 2024“…The best performance of sequence for both datasets is LR_DT_RF which yields 0.9892 F1-Score, 0.9895 Accuracy, and 0.9790 Matthews Correlation Coefficient (MCC) for ISOT Fake News Dataset, and 0.9913 F1-Score, 0.9853 Accuracy, and 0.9455 MCC for CHECKED Dataset. This research could give researchers an approach for fake news detection on different social platforms and feature-based.…”
Get full text
Article -
7787
15.571 Generating Business Value from Information Technology, Spring 2007
Published 2010“…The familiar components of the place: cash, checks, paper reports and documents, store fronts, and face to face meetings remain important, but less so. …”
Get full text
Learning Object -
7788
A multidisciplinary survey of computational techniques for the modelling, simulation and analysis of biochemical networks
Published 2011“…From a practical point of view, in silico experiments can be performed that would be very expensive or impossible to achieve in the laboratory, such as hypothesis-testing with regards to knock-out experiments or overexpression, or checking the validity of a proposed molecular mechanism. …”
Get full text
Get full text
Journal Article -
7789
Greenly prepared antimicrobial cotton fabrics using bioactive agents from Cupressaceae pods
Published 2022“…Finally, the antimicrobial activity of the greenly developed antimicrobial cotton fabrics was checked against Staphylococcus, Escherichia coli, Bacillus and Candida albicans by using the AATCC 100-2004 test method. …”
Get full text
Get full text
Article -
7790
Identification of electromagnetic pre-earthquake perturbations from the DEMETER data by machine learning
Published 2021“…In this paper, we explore 16 spot-checking classification algorithms, among which, the top classifier with low-frequency power spectra of electric and magnetic fields was used for ionospheric perturbation analysis. …”
Get full text
Journal Article -
7791
Mediation effects of language anxiety and prior learning experience on academic speaking challenges and strategies among Libyan students in Malaysian universities
Published 2023“…Field notes and member checks were used for validation. Correlational procedures, structural equation modeling (SEM), and bootstrapping resampling analyses were conducted to examine the relationships between variables, validate study models, and test research hypotheses. …”
Get full text
Article -
7792
-
7793
Center potential
Published 2023“…To ensure the safety and trustworthiness of tutors, this application incorporates a rigorous verification process, which includes background checks, identity verification, and qualification validation. …”
Get full text
Final Year Project (FYP) -
7794
Experiences, perceptions and ethical considerations of the malaria infection study in Thailand
Published 2025“…We found that although compensation was a motivation for participation, this was secondary to it being beneficial to self (health checks; link to health networks; building merit) and others (medical research contribution; altruism). …”
Journal article -
7795
Security for automotive electrical/electronic (E/E) architectures
Published 2018“…SAAN uses probabilistic model checking to calculate the security of automotive networks, based on the architecture and expert evaluations of components. …”
Get full text
Get full text
Thesis -
7796
A comparative analysis of ENCODE and Cistrome in the context of TF binding signal
Published 2024“…Moreover, the output format of the processing (BED narrowPeak) exposes a feature, the signalValue, which is seldom used in consistency checks, but can offer valuable insight on the quality of the data. …”
Get full text
Journal Article -
7797
kboolnet: a toolkit for the verification, validation, and visualization of reaction-contingency (rxncon) models
Published 2023“…The verification script VerifyModel.R checks for responsiveness to repeated stimulations as well as consistency of steady state behavior. …”
Get full text
Article -
7798
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies
Published 2025Get full text
Article -
7799
Selecting correct methods to extract fuzzy rules from artificial neural network
Published 2021“…Fuzzy rules are an intuitive and reasonable representation to be used for explanation, model checking, and system integration. However, different methods may extract different rules from the same ANN. …”
Get full text
Journal Article -
7800
Cooperative collision avoidance in multirobot systems using fuzzy rules and velocity obstacles
Published 2023“…In detail, at any time instant, a robot checks the robots that it may collide with and retrieves the most dangerous robot in each sector based on the predicted collision time; then, the robot generates its velocity in real-time via fuzzy inference and VO-based fine-tuning. …”
Get full text
Journal Article