Search alternatives:
bears » years (Expand Search), beams (Expand Search), beads (Expand Search), besars (Expand Search), nears (Expand Search)
bees » been (Expand Search), bee (Expand Search), sees (Expand Search)
besars » besar (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
beer » been (Expand Search), bee (Expand Search), ber (Expand Search)
bears » years (Expand Search), beams (Expand Search), beads (Expand Search), besars (Expand Search), nears (Expand Search)
bees » been (Expand Search), bee (Expand Search), sees (Expand Search)
besars » besar (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
beer » been (Expand Search), bee (Expand Search), ber (Expand Search)
-
201
Perceptions of gifted adolescents in Singapore towards the "gifted" label and its effects on their social relationships
Published 2008“…Some of the disadvantages include high expectations from parents and teachers and being discriminated by peers in the mainstream. Results of case studies parallel these findings.…”
Get full text
Thesis -
202
Signalling through deviance
Published 2013“…Stimuli were presented in a 2X2 mixed-model design, by manipulating the subjects, whether they are more successful or less successful than their peers, and if the question presented encompasses an identity threat or not. …”
Get full text
Final Year Project (FYP) -
203
Abui stories : seven children
Published 2014“…Thriving on an oral tradition, these stories, like the traditional Abui language, bear no written form and are at risk of extinction. …”
Get full text
Final Year Project (FYP) -
204
Detection of simultaneous structural problems using multiple structural health monitoring techniques
Published 2017“…After the construction, cracks, wear and tear, fatigue, creep, etc., will appear anytime during their life span, which significantly affects the capacity of the structure to bear loads. Hence structure health monitoring (SHM) technique came into existence to detect the structural problems and increase its life span. …”
Get full text
Final Year Project (FYP) -
205
Investigating the impact of the stratified cognitive apprenticeship model on high school students’ math performance
Published 2024“…The results indicated that students instructed using the SCTM outperformed their peers in mathematical achievement, thereby validating SCTM’s effectiveness as a comprehensive educational strategy for mathematics education at the senior high school level.…”
Get full text
Article -
206
Mothers’ social networks and socioeconomic gradients of isolation
Published 2024“…Wealthier women and women from more-advantaged castes and tribes have smaller networks than their less-advantaged peers, primarily because they know fewer women within their own socioeconomic group. …”
Journal article -
207
Social network structure in autistic individuals: a systematic review
Published 2025“…Results indicate that autistic children experience greater isolation with more peripheral status and lower peer acceptance compared with their neurotypical peers. …”
Journal article -
208
How to choose a law review: an empirical study
Published 2023“…The optimal publication strategy for authors depends on whether they want to maximize prestige among peers or rather their impact on the discipline, as well as on authors’ career stage and risk averseness. …”
Journal article -
209
Just Doing My Job: Normative Dimensions of Social Roles
Published 2024“…It also means that role-occupants are not off the moral hook. Ultimately, we each bear responsibility to create a more just social world.…”
Get full text
Thesis -
210
Black-box cryptography is dangerous III
Published 2013“…Cryptographic libraries are readily available for developers to use and download however, many a times, developers do not understand or check the exact codes that they have downloaded and are implementing. …”
Get full text
Final Year Project (FYP) -
211
Automated scripts for testing verilog designs with iVerilog
Published 2015“…Python scripts were written to check for the coding bugs or errors of the source design through the usage of testbenches. …”
Get full text
Final Year Project (FYP) -
212
A vehicle social distancing management system based on LiFi COVID pandemic: real-time monitoring for smart buildings
Published 2024“…For this reason, each time a vehicle requests entry into the facility, a real-time test or check must be performed. This study proposes a real-time vehicle social distancing decision system for managing the number of vehicles (RT-VSDD) that adds an additional testing method besides the traditional testing phase (test reports from test centers) with a real-time vital health check at the building access request in order to reduce the risk of unidentified infected individuals. …”
Get full text
Article -
213
Are you thinking what I'm thinking? : an exploratory study on the attitudes of pregnant employees and co-workers towards workplace pregnancy.
Published 2009“…Our forum findings shed a different perspective: female employees have the liberty to prioritise between family and career but they will have to bear the consequences of their choice. Recommendations by employees include hiring of temporary help, allowing for flexible working hours and open communication channels. …”
Get full text
Final Year Project (FYP) -
214
Negotiating time in British Malaya : colonial Singapore’s role in time legislature, 1895 – 1933
Published 2017“…This paper argues that the various time changes in Singapore and British Malaya between 1895 to 1933 were products borne of influence from international agreements, yet more strongly bear the marks of local negotiation. Being arbitrary in nature, time offsets in the form of mean times, standard times, and daylight saving times were socially determined, negotiated, and sustained, by the circulation of ideas, objects, and actors. …”
Get full text
Final Year Project (FYP) -
215
Autonomised harming
Published 2023“…Second, the paper examines how potential differences between human agents and non-human, artificial agents might bear on the permissibility of delegating life-and death decisions to AI systems. …”
Journal article -
216
Understanding Public and Nonprofit Managers' Motivation Through the Lens of Self-Determination Theory
Published 2016“…The findings show that public managers exhibit stronger service motivation, identified motivation, external motivation, and amotivation when compared to their nonprofit peers. In addition, public managers' strong external motivation and amotivation compromise their overall level of self-determination, suggesting that they may be less motivated by their work requirements than are nonprofit counterparts.…”
Get full text
Get full text
Journal Article -
217
Pendekatan pembelajaran berasaskan simposium: mengasah pemikiran kritis dan komunikasi dalam melahirkan graduan kompetitif
Published 2024“…The symposium provided an opportunity for students to present their research findings, exchange ideas, as well as receive constructive feedback from peers, lecturers, and industry panelists which indirectly enhanced their confidence and communication skills. …”
Get full text
Article -
218
State-feedback control design for polynomial discrete-time systems obtained via second-order Runge-Kutta discretization
Published 2024“…The sum of squares formulation was used to check the constraints. Two approaches are presented, the first makes use of the Lyapunov function to recover the gain matrices. …”
Get full text
Conference or Workshop Item -
219
Fintech renaissance: powering efficiency in Asian banking through country competitiveness
Published 2024“…The panel data regression utilized a fixed-effect model, which was run after a diagnostic check. The validated data satisfied the criteria for stationary, serial autocorrelation, heteroscedasticity, homogeneity, and multicollinearity. …”
Get full text
Article -
220
Multi-objectives firefly algorithm for task offloading in the edge-fog-cloud computing
Published 2024“…Additionally, it verifies the status of the server (on/off) before offloading; if the server is unavailable, the algorithm proceeds to check the next layer. In the second stage, the strategy employs a Multi-objective Firefly (MFA) algorithm to assign the optimal computational device within the selected layer. …”
Get full text
Article