Showing 61 - 80 results of 1,211 for search '(((ill OR ((sthill OR sthtill) OR thiol)) OR all) OR fall) (finding)', query time: 0.16s Refine Results
  1. 61

    Analysis of Minimum Interaction Time for Continuous Distributed Interactive Computing by Zhang, Lu, Tang, Xueyan, He, Bingsheng

    Published 2017
    “…When the simulation time offsets among the servers are fixed, we show that finding the minimum achievable interaction time is still NP-hard. …”
    Get full text
    Get full text
    Journal Article
  2. 62

    Motion and shape recovery from image frame sequences by Sung, Eric.

    Published 2008
    “…Full perspective projection is assumed in all the work. However it is shown that the methodologies proposed do encompass the weak perspective/orthographic projection model as well. …”
    Get full text
    Thesis
  3. 63

    Really cannot understand meh? : Is Singlish internationally unintelligible? by Ng, Jing Hui

    Published 2022
    “…This investigation sought to test the validity of the statement and found that it is only true in some cases. Not all foreigners have trouble understanding Singlish: resident foreigners and Malaysians had an easier time with Singlish than foreigners who have never had exposure to the language. …”
    Get full text
    Final Year Project (FYP)
  4. 64
  5. 65

    Folk pedagogy? Investigating how and why UK early years and primary teachers use songs with young learners by Hamilton, C, Murphy, VA

    Published 2023
    “…There are considerable differences between how early years and upper primary teachers use songs. All use songs intuitively. Research needs to provide more rigorous evidence to underpin this valued teaching practice.…”
    Journal article
  6. 66

    Surface-Enhanced Raman Scattering (SERS) of Nitrothiophenol isomers chemisorbed on TiO2 by Teguh, Jefri S., Liu, Fang, Xing, Bengang, Yeow, Edwin Kok Lee

    Published 2013
    “…Based on the mesomeric effect, the NO2 group para to the thiol had a stronger electron-withdrawing ability than the NO2 group at the meta position. …”
    Get full text
    Get full text
    Journal Article
  7. 67

    Human face recognition using line edge information by Gao, Yong Sheng.

    Published 2008
    “…It is a very encouraging finding that the proposed face recognition technique has performed consistently superior to (or equally well as) the Eigenface method in all the comparison experiments. …”
    Get full text
    Thesis
  8. 68

    Unbiased in silico design of pH-sensitive tetrapeptides by Hu, Yue, Rigoldi, Federica, Sun, Hui, Gautieri, Alfonso, Marelli, Benedetto

    Published 2024
    “…We used coarse-grain molecular dynamics simulations to screen all possible histidine-bearing tetrapeptide sequences, finding novel peptide sequences with pH-tunable assembly properties. …”
    Get full text
    Article
  9. 69

    Mathematical strategame theory by Hui, Peizheng

    Published 2015
    “…The stable matching problem is the problem of finding a stable matching between two equally sized sets of elements given an ordering of preferences of each element. …”
    Get full text
    Final Year Project (FYP)
  10. 70

    Risk breeds risk aversion by He, Tai-Sen, Hong, Fuhai

    Published 2020
    “…In a laboratory setting, all subjects went through twelve rounds of multiple-price-list decisions between a risky alternative and a safe alternative. …”
    Get full text
    Journal Article
  11. 71

    Advertising primed: how professional identity affects moral reasoning by Schauster, Erin, Ferrucci, Patrick, Tandoc, Edson C., Walker, Tara

    Published 2022
    “…To understand how professional identity influences moral reasoning, if at all, and guided by theories of moral psychology and social identity, 134 advertising practitioners working in the USA participated in an online experiment. …”
    Get full text
    Journal Article
  12. 72

    Design and development of indoor navigation system using RFID technology by Aye Myat May Thin

    Published 2014
    “…The communication between Android application and RFID hardware is via Bluetooth. All in all, an Indoor Navigation System is designed and implemented based on RFID technology with an objective of navigating efficiently in the Indoor environment such as hospitals and elderly care centers to fulfill the needs of visually impaired personnel.…”
    Get full text
    Final Year Project (FYP)
  13. 73

    In Tension: Computational exploration of the design space of tensile network structures by Burke, Adam T.

    Published 2024
    “…Instead a process of form-finding must be used to establish a geometry where all edges of the network carry only tensile forces. …”
    Get full text
    Get full text
    Thesis
  14. 74
  15. 75
  16. 76

    An assay of the accuracy of analysts’ reports by Manish Kumar Harish Nandwani, Anil Rai, Prakash Chandra Kamath

    Published 2010
    “…We also determined, through second-order analyses, a measure of concomitance between the forecast error made by analysts and time periods in which the projections were made. This finding affirms prior time-series studies conducted by academics, all of whom are duly attributed in the paper…”
    Get full text
    Final Year Project (FYP)
  17. 77

    Cryogelation of human hair keratins by Chua, Huei Min, Zhao, Zhitong, Ng, Kee Woei

    Published 2021
    “…Meanwhile, it is found that complete thiol-capping of HHK samples significantly inhibits cryogel formation as compared to partially or uncapped HHK samples, suggesting the dominant role of disulfide stabilization in cryogelation. …”
    Get full text
    Journal Article
  18. 78

    Cogency of Suggestion System in Managing Innovation: Reducing Progressive Die Change Over Time in Auto Stamping Operations by Baluch, Nazim Hussain, Mohtar, Shahimi, Nordin, Norani

    Published 2013
    “…The paper evinces the efficacy of suggestion systems in managing ideas; having the capability of being all inclusive by being able to focus on capturing ideas from all workers. …”
    Get full text
    Article
  19. 79

    Security enhancements to prevent DNS cache poisoning attacks by Chong, Soon Seng

    Published 2018
    “…One of it is DNS Cache Poisoning where attackers forcefully gain access to the names server and change the cache record, diverting users to malicious websites meant to steal confidential information for financial gain or ill-intent. DNSSEC has been introduced as a solution to DNS Cache Poisoning but has not been very popular with the internet community. …”
    Get full text
    Final Year Project (FYP)
  20. 80

    READY PLAYER ONE / by Cline, Ernest, author 655943

    Published 2012
    “…And then Wade stumbles onto the key to the first puzzle. Suddenly, he finds himself pitted against thousands of competitors in a desperate race to claim the ultimate prize, a chase that soon takes on terrifying real-world dimensions - and that will leave both Wade and his world profoundly changed.…”
    text