Search alternatives:
horne » borne (Expand Search), horn (Expand Search)
horng » hong (Expand Search), hoong (Expand Search), horn (Expand Search)
born » boon (Expand Search)
hone » phone (Expand Search), honey (Expand Search), bhone (Expand Search)
horse » house (Expand Search), worse (Expand Search)
horne » borne (Expand Search), horn (Expand Search)
horng » hong (Expand Search), hoong (Expand Search), horn (Expand Search)
born » boon (Expand Search)
hone » phone (Expand Search), honey (Expand Search), bhone (Expand Search)
horse » house (Expand Search), worse (Expand Search)
-
41
Preterm birth and cardiometabolic health trajectories from birth to adulthood: the Avon Longitudinal Study of Parents and Children
Published 2025“…<p><strong>Background:</strong> Adults who were born prematurely (<37 weeks gestation) are at increased cardiovascular disease risk, but it is unclear when in the life course this risk emerges. …”
Journal article -
42
"不似华人" :19世纪至20世纪初海峡土生华人的困境 = "Not Really Chinese" : dilemma of the Straits Chinese from 19th to 20th century
Published 2021“…Among his narratives, the views of the local-born Chinese he concluded is that they were “Not Really Chinese”. …”
Get full text
Final Year Project (FYP) -
43
The influence of pregnancy complications on fetal and neonatal cardiovascular development
Published 2016“…Higher blood pressure has also been observed in those born preterm in addition to specific cardiac modifications in young adulthood.…”
Thesis -
44
SUPERHERO OF LOVE : HEAL YOUR BROKEN HEART & THEN GO SAVE THE WORLD /
Published 2019“…Readers will develop and hone their powers of Super Sight, Super Hearing, Super Humility, Super Self-Love, and Super Alignment to build their connection to their own hearts, the ultimate source of love in their lives…”
text -
45
People in Peril, Environments at Risk: Coolies, Tigers, and Colonial Singapore's Ecology of Poverty
Published 2018Get full text
Get full text
Journal Article -
46
EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs /
Published 2023“…This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. …”
Get full text
Get full text
software, multimedia -
47
Development of a word segmentation algorithm for Myanmar language
Published 2008Get full text
Thesis -
48
Cohort differences in physical health and disability in the United States and Europe
Published 2024“…Still, in both the United States and Europe, we observed a structural break in disability trends, with declines observed in prewar cohorts slowing, stalling, or reversing for cohorts born since 1945. <p><strong> Discussion</strong></p> In all regions, we found evidence for worsening health across cohorts, particularly for those born since 1945. …”
Journal article -
49
Tabula rasa: model transfer for object category detection
Published 2012“…Experiments (on PASCAL VOC) demonstrate significant performance gains by transfer learning from one class to another (e.g. motorbike to bicycle), including one-shot learning, specialization from class to a subordinate class (e.g. from quadruped to horse) and transfer using multiple components. In the case of multiple training samples it is shown that a detection performance approaching that of the state of the art can be achieved with substantially fewer training samples.…”
Conference item -
50
Elephant in the room
Published 2014“…A man born without a soul finds himself on a quest to 'fix' himself after the death of his mother. …”
Get full text
Final Year Project (FYP) -
51
Educated : a memoir /
Published [201“…Born to survivalists in the mountains of Idaho, Tara Westover was seventeen the first time she set foot in a classroom. …”
text -
52
Starting from scratch
Published 2016“…Based on research findings, the problem statement was identified, which helped hone the campaign’s strategy, tactics and goals. …”
Get full text
Final Year Project (FYP) -
53
Bacterial type VI secretion system helps prevent cheating in microbial communities
Published 2024“…In their paper, “Trojan horse-like T6SS effector TepC mediates both interference competition and exploitative competition”, Song and colleagues (2024) remind us of an important societal principle that everyone contributes to benefit the collective population [1]. …”
Get full text
Journal Article -
54
OLIVER TWIST /
Published 2012“…Oliver Twist is born in the harsh confines of a workhouse, his mother expiring in childbirth, his father unknown. …”
text -
55
Efficient digital traffic accident mapping
Published 2008“…This paper describes the design and development of one system born out of an attempt to produce a low cost, simple to use, photogrammetric-based three dimensional computer graphics visualization system for traffic accident mapping.…”
Get full text
Research Report -
56
DARE
Published 2017“…DARE celebrates grit and hardiness through a montage of imagery that illustrate struggles born from limitations. Characters are used as parallels as they go through a white-knuckled grind of preparation, pursuit, struggle, and overcoming.…”
Get full text
Final Year Project (FYP) -
57
How Taoism addresses unbalanced lives of urban female : see things differently
Published 2012“…Born, educated and grown in developing countries that are still faithful to tradition and cultural heritage, young Asian women encounter inevitable tensions between tradition and modern lifestyles that makes her loose harmony and balance in her daily life. …”
Get full text
Final Year Project (FYP) -
58
GHZ-like states in the Qubit-Qudit Rabi model
Published 2023“…The ground state of the strongly coupled system is found to be of Greenberger-Horne-Zeilinger (GHZ) type. Therefore, despite the qubit-qudit strong coupling, the nature of the specific tripartite entanglement of the GHZ state suppresses the bipartite entanglement. …”
Get full text
Journal Article -
59
Entanglement witness via symmetric two-body correlations
Published 2018“…We show that while the witness is unable to detect Greenberger-Horne-Zeilinger (GHZ) states, it is instead able to detect superpositions of Dicke states with GHZ states.…”
Get full text
Get full text
Journal Article -
60
Anatomy of gloom.
Published 2009“…The Puppet wakes up in a gloomy world. Like a new born baby, she is amused her existence. A spider crawls out of her heart and hynotises the puppet, shows her an perplexing illusion of a woman trapped inside a massive flower. …”
Get full text
Final Year Project (FYP)