Search alternatives:
peers » peer (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
teens » teen (Expand Search)
tens » tends (Expand Search), ten (Expand Search), tend (Expand Search)
bears » years (Expand Search), bear (Expand Search), beads (Expand Search)
beams » beam (Expand Search)
peers » peer (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
teens » teen (Expand Search)
tens » tends (Expand Search), ten (Expand Search), tend (Expand Search)
bears » years (Expand Search), bear (Expand Search), beads (Expand Search)
beams » beam (Expand Search)
-
381
How to choose a law review: an empirical study
Published 2023“…The optimal publication strategy for authors depends on whether they want to maximize prestige among peers or rather their impact on the discipline, as well as on authors’ career stage and risk averseness. …”
Journal article -
382
Biomedical cellular imaging using digital holographic photothermal microscope
Published 2011“…Since the past few years, a breakthrough attempt in incorporating DHM into PTI has been conducted and till recently, our PTI-DHM setup has been established. …”
Get full text
Final Year Project (FYP) -
383
Target Design and Optimizations for Spent Fuel Transmutation
Published 2024“…This thesis examines the feasibility of using proton beams to transmute LLFPs into shorterlived or stable isotopes. …”
Get full text
Thesis -
384
The role of membrane curvature in nanoscale topography-induced intracellular signaling
Published 2019“…Over the past decade, there has been growing interest in developing biosensors and devices with nanoscale and vertical topography. …”
Get full text
Get full text
Journal Article -
385
Carbon monoxide poisoning mitigation approaches for the anode of polymer electrolyte membrane fuel cells
Published 2013“…The presence of CO even in very low concentrations (a few tens of ppm level) is the main source of overpotential loss in the anode of PEMFC’s. …”
Get full text
Thesis -
386
Scalable cascade inference for semantic image segmentation
Published 2012“…However when working in a more general setting where the number of classes could easily reach tens of thousands, sub-linear complexity is desired. …”
Conference item -
387
On affine invariant clustering and automatic cast listing in movies
Published 2002“…This is a very demanding test as it involves detecting and clustering over tens of thousands of images with the variances including changes in viewpoint, lighting, scale and expression.…”
Conference item -
388
An Unusual Harassment Training That Was Warmly Received and Also Inspired Bystanders
Published 2025Get full text
Working Paper -
389
Singapore Shipping Trust.
Published 2009“…We also explore the shipping trusts’ financial performance through comparison with the Singapore market, as well as with Singapore REITs, Singapore shipping stocks and their foreign peers. Results from CAPM show presence of risk-adjusted returns for the equal-weighted shipping trust portfolio in the before-subprime period, indicating the attractiveness of shipping trusts during better economic conditions. …”
Get full text
Final Year Project (FYP) -
390
The friendly muse : ADM student wellbeing
Published 2017“…Drawing from personal experience and that of fellow peers, the project investigates how to create a more relatable, approachable and contextualized experience for ADM students.…”
Get full text
Final Year Project (FYP) -
391
Coherently tunable triangular trefoil phaseonium metamaterial
Published 2018“…Phaseonium is a three-level Λ quantum system, in which a coherent microwave and an optical control (pump) beams can be used to actively modulate the dielectric response. …”
Get full text
Get full text
Journal Article -
392
Using dynamic assessment of writing to promote technology-enhanced learning in higher education (Abstract) [Conference paper]
Published 2023“…Responding to students’ request for the use of digitally-enhanced formative assessment practices, this project used a dynamic assessment approach that has been developed within the Vygotskian sociocultural theory of learning. …”
Get full text
Conference or Workshop Item -
393
Polymeric composites for powder-based additive manufacturing : materials and applications
Published 2020“…As one of the most important categories in the additive manufacturing (AM) field, powder-based techniques, such as selective laser sintering, electron beam melting and selective laser melting, utilize laser or electronic beams to selectively fuse polymeric, metallic, ceramic or composite powders layer-by-layer into desired products according to their computer-aided design models. …”
Get full text
Journal Article -
394
The anxious chronicles: visualising my anxiety through acceptance commitment therapy (ACT) as well as humour and satire
Published 2024“…I noticed that I myself have been facing anxiety together with my peers around me and how we often use humour in the form of sarcasm or irony to externalise and mediate our emotions. …”
Get full text
Final Year Project (FYP) -
395
Unlocking the mysteries behind baby viral videos.
Published 2012“…Although there are a few researches that explored how videos become viral, minimal research has been done to understand the complexity behind baby-related viral videos. …”
Get full text
Final Year Project (FYP) -
396
SHAP-EDITOR: instruction-guided latent 3D editing in seconds
Published 2024“…Distillation necessitates at least tens of minutes per asset to attain satisfactory editing results, and is thus not very practical. …”
Conference item -
397
-
398
Creating functionally graded concrete materials with varying 3D printing parameters
Published 2022Get full text
Journal Article -
399
Secure image encryption based on an ideal new nonlinear discrete dynamical system
Published 2018“…Extensive numerical experiment results have revealed that the proposed image encryption algorithm offers advantages of unlimited key space and high-level security, since those problematic periodic windows are no longer present within the key space, and it is extremely robust against known-plain-text attack, since the chaotic sequence generated bears no correlation whatsoever due to the folding effect of modulo operation. …”
Get full text
Get full text
Journal Article -
400
Unveiling student perspectives on online presentations
Published 2024“…In a typical online presentation, students deliver information or projects through digital platforms, sharing their work in real time with instructors and peers. Various tools, such as Zoom, Microsoft Teams, and Google Meet, are frequently used to facilitate these presentations. …”
Get full text
Get full text
Article