Search alternatives:
peers » peer (Expand Search)
bears » years (Expand Search), beams (Expand Search), bear (Expand Search)
cheaters » heaters (Expand Search), centers (Expand Search), cheaper (Expand Search)
chapters » chapter (Expand Search)
checks » check (Expand Search)
peers » peer (Expand Search)
bears » years (Expand Search), beams (Expand Search), bear (Expand Search)
cheaters » heaters (Expand Search), centers (Expand Search), cheaper (Expand Search)
chapters » chapter (Expand Search)
checks » check (Expand Search)
-
161
A three-membered diazo-aluminum heterocycle to access an Al=C π bonding species
Published 2022“…An X-ray study shows that the anionic part of 5 bears a considerable short exocyclic Al-C bond, and computational studies involving molecular orbital and natural bond orbital analysis indicate the Al=C π bonding character. …”
Get full text
Journal Article -
162
Single-Shot Decoding of Good Quantum LDPC Codes
Published 2024“…Quantum Tanner codes constitute a family of quantum low-density parity-check codes with good parameters, i.e., constant encoding rate and relative distance. …”
Get full text
Article -
163
Active Learning for Inference and Regeneration of Applications that Access Databases
Published 2025“…Konure also implements a regenerator that produces a translated Python implementation of the application that systematically includes relevant security and error checks.…”
Get full text
Article -
164
Inherently vulnerable? Ethnic geography and the intensity of violence in the Bosnian civil war
Published 2015“…The results remain robust when accounting for the presence of the UN peacekeeping mission (UNPROFOR) and across several robustness checks.…”
Journal article -
165
The Importance of Bystanders in Threat Assessment and Management
Published 2025“…Numerous studies of targeted violence (e.g., mass shootings and school shootings), have demonstrated that peers and bystanders often have knowledge of an attacker’s intentions, concerning communication, and troubling behavior before the attack occurs. …”
Get full text
Book chapter -
166
Deep learning with application to hashing
Published 2014“…I present a cross view feature hashing technique using deep learning and show some results. These three chapters are main chapters. Chapter 1 and Chapter 5 are introduction and conclusion.…”
Get full text
Thesis -
167
Nonlinear oscillations and chaos in chemical cardiorespiratory control
Published 1995“…Chapter 3 scales and simplifies the Grodins model; Chapters 4, 5, 6 consider carbon dioxide dynamics at the central chemoreceptor. …”
Thesis -
168
-
169
Linear A libation tables : a semitic connection explored
Published 2020“…Unlike the Linear B language (Mycenaean Greek), Minoan, the language hidden behind Linear A and still undeciphered, bears no apparent similarity to Greek, and any ‘translation’ of Linear A based provisionally on Linear B phonetic values has not produced any tangible result. …”
Get full text
Journal Article -
170
Creating functionally graded concrete materials with varying 3D printing parameters
Published 2022Get full text
Journal Article -
171
Secure image encryption based on an ideal new nonlinear discrete dynamical system
Published 2018“…Extensive numerical experiment results have revealed that the proposed image encryption algorithm offers advantages of unlimited key space and high-level security, since those problematic periodic windows are no longer present within the key space, and it is extremely robust against known-plain-text attack, since the chaotic sequence generated bears no correlation whatsoever due to the folding effect of modulo operation. …”
Get full text
Get full text
Journal Article -
172
Technology-integration in language studies: Cultivating future paradigms
Published 2024“…This book emerges from the need to explore, understand, and document these dynamic shifts in the English language learning environment. Comprising seven chapters, each chapter examines how different technological platforms can be leveraged to foster collaborative learning, improve student engagement, and address the challenges educators and learners face. …”
Get full text
Get full text
Edited book -
173
Unveiling student perspectives on online presentations
Published 2024“…In a typical online presentation, students deliver information or projects through digital platforms, sharing their work in real time with instructors and peers. Various tools, such as Zoom, Microsoft Teams, and Google Meet, are frequently used to facilitate these presentations. …”
Get full text
Get full text
Article -
174
Cognitive aspects of generalised anxiety disorder in adolescents: exploring intolerance of uncertainty, cognitive avoidance, and positive beliefs about worry
Published 2025“…Adolescents with GAD reported significantly higher intolerance of uncertainty and positive beliefs about worry relative to their peers with other anxiety diagnoses, whilst levels of cognitive avoidance did not differ significantly. …”
Journal article -
175
British Muslim youth and religious fundamentalism: a quantitative investigation
Published 2012“…We use new survey data to empirically examine how Muslim youth differ from older Muslims and non-Muslim British peers on religiosity, Islam-specific and broader social attitudes. …”
Journal article -
176
Building SenticNet 7
Published 2021“…The error checking program utilizes the keyword extractor, sentiment analysis and synonyms functions. …”
Get full text
Final Year Project (FYP) -
177
Prescriptive analytics models for vessel inspection planning in maritime transportation
Published 2024“…The inspection process involves identifying high-risk vessels, allocating surveyors, and conducting onboard checks. This study aims to optimize the selection and assignment process through a two-stage framework, balancing the benefits of identifying deficiencies against the costs of inspection delays. …”
Get full text
Journal Article -
178
Effect of Dactylaria higginsii on interference of Cyperus rotundus with L. esculentum
Published 1999“…At 106 conidia ml-1, D. higginsii reduced the interference from C. rotundus, controlled C. rotundus better, and increased L. esculentum yield compared to the weedy checks.…”
Article -
179
Effective 5D BIM requirements for risk mitigation during pre-contract stage.
Published 2022“…Risk mitigation strategies are proposed to make a positive impact on the 5D BIM implementation, which consist of regular checks and balances, improve skills and knowledge through training and acquire suitable 5D BIM applications. …”
Get full text
Article -
180
Company Law /
Published 2018“…Each chapter opens with Learning Outcomes and at the end of each chapter, students are provided with a summary, a list of key terms, and structured and discussion questions. …”
text