Search alternatives:
till » still (Expand Search), fill (Expand Search), hill (Expand Search)
sthtill » sthstill (Expand Search), sthfill (Expand Search), sthhill (Expand Search)
fthill » thill (Expand Search), foothill (Expand Search)
nhill » hill (Expand Search), neill (Expand Search)
finding » funding (Expand Search)
findings » fundings (Expand Search)
till » still (Expand Search), fill (Expand Search), hill (Expand Search)
sthtill » sthstill (Expand Search), sthfill (Expand Search), sthhill (Expand Search)
fthill » thill (Expand Search), foothill (Expand Search)
nhill » hill (Expand Search), neill (Expand Search)
finding » funding (Expand Search)
findings » fundings (Expand Search)
-
1161
Indo-European youth priesthoods and the Männerbund theory: a study of the Vedic Vrātyas and their ancient Indo-European analogues
Published 2024“…These have been selected because they all possess languages descended from Proto-Indo-European (PIE), a reconstructed ancestor language. …”
Thesis -
1162
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies
Published 2025Get full text
Article -
1163
Integrated optimization algorithm: a metaheuristic approach for complicated optimization
Published 2022Get full text
Journal Article -
1164
Personalised modelling of geographic movements in depression
Published 2018“…This is applied to 59 participants who provided more than 5 weeks of data for analysis, and finds that there are indeed several groups of individuals that appeared to behave similarly. …”
Thesis -
1165
Executive's Cybersecurity Program Handbook : A comprehensive guide to building and operationalizing a complete cybersecurity program /
Published 2023“…Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and audits Key Features Get started as a cybersecurity executive and design an infallible security program Perform assessments and build a strong risk management framework Promote the importance of security within the organization through awareness and training sessions Book Description Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. …”
Get full text
Get full text
software, multimedia -
1166
Phononic real Chern insulator with protected corner modes in graphynes
Published 2023Get full text
Journal Article -
1167
-
1168
Dynamic spectrum allocation for heterogeneous cognitive radio networks with multiple channels
Published 2019Get full text
Get full text
Journal Article -
1169
-
1170
Ultra-high Q even eigenmode resonance in terahertz metamaterials
Published 2015“…The high Q even eigenmode could find applications in designing label free bio-sensors and for studying the enhanced light matter interaction effects.…”
Get full text
Get full text
Journal Article -
1171
RoboTSP - a fast solution to the robotic task sequencing problem
Published 2021Get full text
Conference Paper -
1172
Uncovering vein patterns from color skin images for personal identification in forensic investigation
Published 2013“…Using an automatic matching algorithm, we match resultant images from the RGB-NIR mapping approach and find that its matching result is comparable to the result from matching NIR images, which are always considered as ground truth of vein patterns. …”
Get full text
Thesis -
1173
Efficient techniques for subgraph mining and query processing
Published 2015“…In this thesis, we study three important problems on subgraph mining and query processing, i.e., frequent subgraph mining, network motif discovery, and generalized subgraph query processing. These problems find numerous applications in real world, whereas they are extremely challenging.% since subgraph isomorphism testing is NP-hard. …”
Get full text
Thesis -
1174
Causal attribution, benefits sharing, and earnings management
Published 2022Get full text
Journal Article -
1175
Mind the perception gap: The impact of bus rapid transit infrastructure on travelers’ perceptions of affective subjective well-being
Published 2024“…We test this approach using an urban corridor approximately 2 km in length in Boston, exploring the impact of 65 different BRT infrastructure alternatives. We find that: (1) compared to regular bus services, a ‘standard BRT’ consisting of a painted bus lane and the addition of a cycle lane significantly enhances SWB; (2) an ‘SWB infrastructure’ option that replaces car parking with improvements for cyclists and pedestrians and adds street amenities further enhances SWB; and, (3) the BRT infrastructure elements most effective in enhancing affective SWB for users of all transport modes are the addition of green spaces, improvement of crosswalks, and provision of more space for pedestrians and cyclists. …”
Get full text
Article -
1176
-
1177
Optimizing resource allocation in large communications satellite constellations
Published 2024“…The methods leverage optimization to find an optimized set of decisions that maximize capacity and quality of service and minimize necessary ground infrastructure, all while avoiding interference. …”
Get full text
Thesis -
1178
Biomechanical study on arthroscopic biceps tenodesis fixation techniques
Published 2020“…Thus, it is important to find the best repair technique among the two different techniques through biomechanical experiments. …”
Get full text
Final Year Project (FYP) -
1179
An optimal scheduling scheme for electric vehicles in smarts grids
Published 2020“…Therefore, in this project, two techniques of optimization will be performed to find the optimal electric vehicle charging scheduling. …”
Get full text
Final Year Project (FYP) -
1180
Self-healing characterizations of polyurea/polyurethane coating & its formulation optimization
Published 2021“…In midst of the global rising cost of corrosion, solutions such as application of protective coating and employing regular maintenance work have been put in place. All these efforts made primarily to aim for the lifetime extension of what is being protected. …”
Get full text
Final Year Project (FYP)