Search alternatives:
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search), beenrs (Expand Search)
bee » been (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), crackers (Expand Search)
hackers » trackers (Expand Search)
checks » check (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search), beenrs (Expand Search)
bee » been (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), crackers (Expand Search)
hackers » trackers (Expand Search)
checks » check (Expand Search)
-
161
Design and implementation of a synthesizable test-bench for testing the LDPC decoder IP
Published 2018“…The simulation environment is mainly used for preliminary and functional checks, and the emulation environment is chosen for further verification due to its much higher run speed compared to simulation.…”
Get full text
Thesis -
162
Encrypted smartphone with advanced encryption standard 256
Published 2011“…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
Get full text
Final Year Project (FYP) -
163
-
164
Effect of Dactylaria higginsii on interference of Cyperus rotundus with L. esculentum
Published 1999“…At 106 conidia ml-1, D. higginsii reduced the interference from C. rotundus, controlled C. rotundus better, and increased L. esculentum yield compared to the weedy checks.…”
Article -
165
Effective 5D BIM requirements for risk mitigation during pre-contract stage.
Published 2022“…Risk mitigation strategies are proposed to make a positive impact on the 5D BIM implementation, which consist of regular checks and balances, improve skills and knowledge through training and acquire suitable 5D BIM applications. …”
Get full text
Article -
166
-
167
A low-power IoT platform based smart plug for smart home system
Published 2016“…Presently, there are three most popular wireless communication technologies including Bluetooth, ZigBee, and Wi-Fi which are adopted in the intelligent home system. …”
Get full text
Thesis -
168
Tournament induced incentives and analysts' boldness.
Published 2012“…This finding survives several robustness checks and is more pronounced when the interim assessment date is closer to the end of the tournament period, when analysts are inexperienced/non-all-star, and when the market activity is high. …”
Get full text
Thesis -
169
-
170
-
171
Influence of non-linear wave load models on monopile supported offshore wind turbines for extreme conditions
Published 2025“…These models are compared to the widely used constrained wave approach, showing that significant differences are predicted for steel and geotechnical design checks. This suggests that the industry standard approach may be inappropriate for the design of monopile structures against extreme wave loads.…”
Journal article -
172
Mediation effects of language anxiety and prior learning experience on academic speaking challenges and strategies among Libyan students in Malaysian universities
Published 2023“…Field notes and member checks were used for validation. Correlational procedures, structural equation modeling (SEM), and bootstrapping resampling analyses were conducted to examine the relationships between variables, validate study models, and test research hypotheses. …”
Get full text
Article -
173
Developing of innovative and cool mobile applications on the Googles Android powered devices 5
Published 2014“…Sports Info is tailored to meet the expectations of smart phone users who regularly checks sports updates like match schedules, score card and important sports news.…”
Get full text
Final Year Project (FYP) -
174
-
175
-
176
OSPC: Multimodal Harmful Content Detection using Fine-tuned Language Models
Published 2024Get full text
Article -
177
An evaluation of the RecycleNSave initiative in Singapore
Published 2023“…This paper also identifies flaws in the design and implementation of RecycleNSave, and proposes recommendations to improve its effectiveness through increasing publicity efforts, change in reward options, lowering of redemption criteria, change in location of RVMs and introducing data-based scheduled checks on RVMs.…”
Get full text
Final Year Project (FYP) -
178
Short-term load forecasting by wavelet transform and evolutionary extreme learning machine
Published 2015“…This paper proposes a novel short-term load forecasting (STLF) method based on wavelet transform, extreme learning machine (ELM) and modified artificial bee colony (MABC) algorithm. The wavelet transform is used to decompose the load series for capturing the complicated features at different frequencies. …”
Get full text
Get full text
Get full text
Journal Article -
179
Get a Copy Find a copy in the library Internet of Things and Connected Technologies : Conference Proceedings on 5th International Conference on Internet of Things and Connected Tec...
Published [202“…This book presents the recent research adoption of a variety of enabling wireless communication technologies like RFID tags, BLE, ZigBee, etc., and embedded sensor and actuator nodes, and various protocols like CoAP, MQTT, DNS, etc., that has made Internet of things (IoT) to step out of its infancy to become smart things. …”
text -
180
Single-Shot Decoding of Good Quantum LDPC Codes
Published 2024“…Quantum Tanner codes constitute a family of quantum low-density parity-check codes with good parameters, i.e., constant encoding rate and relative distance. …”
Get full text
Article