Showing 7,781 - 7,800 results of 7,811 for search '(((cheers OR cheaters) OR (beers OR been)) OR check)*', query time: 0.15s Refine Results
  1. 7781

    Towards explainable and semantically coherent claim extraction for an automated fact-checker by Yoswara, Jocelyn Valencia

    Published 2024
    “…Therefore, this project aims to enhance the claim extraction process of an automatic fact-checker, improve the accuracy of fact-checking, and mitigate the limitations associated with LLMs' reliance on outdated information. …”
    Get full text
    Final Year Project (FYP)
  2. 7782

    Three dimensional numerical manifold method and rock engineering applications by He, Lei

    Published 2011
    “…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
    Get full text
    Thesis
  3. 7783

    SCE17-0185: STIX representation of cyber threat intelligence by Phua, Kin Wee

    Published 2018
    “…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
    Get full text
    Final Year Project (FYP)
  4. 7784

    Integration of genetic data and genomic annotation in the analysis of genome wide association studies by Ng, E

    Published 2017
    “…To fine map these loci and assign functional annotation, I created Bayesian credible sets and checked for overlap between SNPs in these credible sets and regulatory marks in the Encyclopaedia of DNA Elements (ENCODE) database. …”
    Thesis
  5. 7785

    Prevalence of sleep disturbance in patients with ankylosing spondylitis: a systematic review and meta-analysis by Salari, Nader, Sadeghi, Narges, Hosseinian-Far, Amin, Hasheminezhad, Razie, Khazaie, Habibolah, Shohaimi, Shamarina, Mohammadi, Masoud

    Published 2023
    “…Heterogeneity among the identified studies was checked using the I2 index, and the Begg and Mazumdar correlation test examined the existence of published bias. …”
    Get full text
    Article
  6. 7786

    A Multi-tier Model and Filtering Approach to Detect Fake News Using Machine Learning Algorithms by Yu, Chiung Chang, A Hamid, Isredza Rahmi, Abdullah, Zubaile, Kipli, Kuryati, Amnur, Hidra

    Published 2024
    “…The best performance of sequence for both datasets is LR_DT_RF which yields 0.9892 F1-Score, 0.9895 Accuracy, and 0.9790 Matthews Correlation Coefficient (MCC) for ISOT Fake News Dataset, and 0.9913 F1-Score, 0.9853 Accuracy, and 0.9455 MCC for CHECKED Dataset. This research could give researchers an approach for fake news detection on different social platforms and feature-based.…”
    Get full text
    Article
  7. 7787

    15.571 Generating Business Value from Information Technology, Spring 2007 by Weill, Peter

    Published 2010
    “…The familiar components of the place: cash, checks, paper reports and documents, store fronts, and face to face meetings remain important, but less so. …”
    Get full text
    Learning Object
  8. 7788

    A multidisciplinary survey of computational techniques for the modelling, simulation and analysis of biochemical networks by Decraene, James, Hinze, Thomas

    Published 2011
    “…From a practical point of view, in silico experiments can be performed that would be very expensive or impossible to achieve in the laboratory, such as hypothesis-testing with regards to knock-out experiments or overexpression, or checking the validity of a proposed molecular mechanism. …”
    Get full text
    Get full text
    Journal Article
  9. 7789

    Greenly prepared antimicrobial cotton fabrics using bioactive agents from Cupressaceae pods by Syed, Murtaza Haider, Mior Ahmad Khushairi, Mohd Zahari, Qutaba, Syed, Norhayati, Abdullah, Syed, Lubna, Abro, Zamir Ahmed

    Published 2022
    “…Finally, the antimicrobial activity of the greenly developed antimicrobial cotton fabrics was checked against Staphylococcus, Escherichia coli, Bacillus and Candida albicans by using the AATCC 100-2004 test method. …”
    Get full text
    Get full text
    Article
  10. 7790

    Identification of electromagnetic pre-earthquake perturbations from the DEMETER data by machine learning by Xiong, Pan, Long, Cheng, Zhou, Huiyu, Battiston, Roberto, Zhang, Xuemin, Shen, Xuhui

    Published 2021
    “…In this paper, we explore 16 spot-checking classification algorithms, among which, the top classifier with low-frequency power spectra of electric and magnetic fields was used for ionospheric perturbation analysis. …”
    Get full text
    Journal Article
  11. 7791

    Mediation effects of language anxiety and prior learning experience on academic speaking challenges and strategies among Libyan students in Malaysian universities by Halali, Ahlam Ali Salim, Ismail, Lilliati, Abd Samad, Arshad, Razali, Abu Bakar, Noordin, Nooreen

    Published 2023
    “…Field notes and member checks were used for validation. Correlational procedures, structural equation modeling (SEM), and bootstrapping resampling analyses were conducted to examine the relationships between variables, validate study models, and test research hypotheses. …”
    Get full text
    Article
  12. 7792
  13. 7793

    Center potential by Tan, Hu Soon

    Published 2023
    “…To ensure the safety and trustworthiness of tutors, this application incorporates a rigorous verification process, which includes background checks, identity verification, and qualification validation. …”
    Get full text
    Final Year Project (FYP)
  14. 7794

    Experiences, perceptions and ethical considerations of the malaria infection study in Thailand by Naemiratch, B, Kulpijit, N, Ruangkajorn, S, Day, NPJ, Prachumsri, J, Cheah, PY

    Published 2025
    “…We found that although compensation was a motivation for participation, this was secondary to it being beneficial to self (health checks; link to health networks; building merit) and others (medical research contribution; altruism). …”
    Journal article
  15. 7795

    Security for automotive electrical/electronic (E/E) architectures by Mundhenk, Philipp

    Published 2018
    “…SAAN uses probabilistic model checking to calculate the security of automotive networks, based on the architecture and expert evaluations of components. …”
    Get full text
    Get full text
    Thesis
  16. 7796

    A comparative analysis of ENCODE and Cistrome in the context of TF binding signal by Perna, Stefano, Pinoli, Pietro, Ceri, Stefano, Wong, Limsoon

    Published 2024
    “…Moreover, the output format of the processing (BED narrowPeak) exposes a feature, the signalValue, which is seldom used in consistency checks, but can offer valuable insight on the quality of the data. …”
    Get full text
    Journal Article
  17. 7797

    kboolnet: a toolkit for the verification, validation, and visualization of reaction-contingency (rxncon) models by Carretero Chavez, Willow, Krantz, Marcus, Klipp, Edda, Kufareva, Irina

    Published 2023
    “…The verification script VerifyModel.R checks for responsiveness to repeated stimulations as well as consistency of steady state behavior. …”
    Get full text
    Article
  18. 7798
  19. 7799

    Selecting correct methods to extract fuzzy rules from artificial neural network by Tan, Xiao, Zhou, Yuan, Ding, Zuohua, Liu, Yang

    Published 2021
    “…Fuzzy rules are an intuitive and reasonable representation to be used for explanation, model checking, and system integration. However, different methods may extract different rules from the same ANN. …”
    Get full text
    Journal Article
  20. 7800

    Cooperative collision avoidance in multirobot systems using fuzzy rules and velocity obstacles by Tang, Wenbing, Zhou, Yuan, Zhang, Tianwei, Liu, Yang, Liu, Jing, Ding, Zuohua

    Published 2023
    “…In detail, at any time instant, a robot checks the robots that it may collide with and retrieves the most dangerous robot in each sector based on the predicted collision time; then, the robot generates its velocity in real-time via fuzzy inference and VO-based fine-tuning. …”
    Get full text
    Journal Article