Search alternatives:
east » least (Expand Search)
Showing 2,481 - 2,500 results of 6,043 for search '(((zfast OR (past OR part)) OR zfast) OR ((east OR last) OR fast))', query time: 0.15s Refine Results
  1. 2481

    High wavenumber coherent structures in low re apg-boundary-layer transition flow—a numerical study by Lo, Edmond Yat-Man, Chen, Weijia

    Published 2019
    “…The tip part is associated with the later first ring-like vortex, while the rear part with the remainder of the Λ-vortex. …”
    Get full text
    Get full text
    Journal Article
  2. 2482

    What helps children learn difficult tasks: a teacher's presence may be worth more than a screen by Kostyrka-Allchorne, Katarzyna, Holland, Amanda, Cooper, Nicholas R., Ahamed, Woakil, Marrow, Rachel K., Simpson, Andrew

    Published 2019
    “…Conversely, physically taking part in interactive touchscreen training did not result in more learning than passive screen viewing.…”
    Get full text
    Article
  3. 2483

    Non-prescribed spaces, creativity and narrative formation: a systems-based examination of a community art group exploring food poverty by Wheeler, B

    Published 2018
    “…This article describes a year-long participatory arts project carried out as part of a community–university partnership in the South of England. …”
    Journal article
  4. 2484

    A phenomenology of kenosis: Jean-Luc Nancy after the theological turn by Deketelaere, N

    Published 2020
    “…</p> <p>Specifically, each half of the study critically engages the theologisation of respective aspects of Husserl’s leibhaftige Gegebenheit of phenomena: part I considers Jean-Luc Marion’s identification of givenness (Gegebenheit) with revelation, whilst part II considers Michel Henry’s identification of embodiment (Leibhaftigkeit) with incarnation. …”
    Thesis
  5. 2485

    Ribbon braids and related operads by Wahl, N

    Published 2001
    “…This thesis consists of two parts, both being concerned with operads related to the ribbon braid groups. …”
    Thesis
  6. 2486

    Delay-and-pay: prolonging pharmaceutical patent protection without paying the ‘price’ by Foss-Solbrekk, K

    Published 2024
    “…<p>This thesis argues that actors use the patent system as part of a ‘delay-and-pay’ strategy to preserve drug prices for as long as possible by delaying generic/biosimilar market entry – and that they have a significant incentive to do so. …”
    Thesis
  7. 2487

    Théodore Rousseau (1812-67), his patrons and his public by Kelly, S

    Published 1996
    “…The thesis examines the nature of the dynamic between Rousseau and his consumers and the extent to which the artist's style may, or may not, be affected by the taste of his audience.</p><p>In Part I, I examine Rousseau's involvement with the members of his circle including those who supported him during his years of absence from the Salon, the critic, Théophile Thoré, the industrialist, Frédéric Hartmannn and the civil servant, Alfred Sensier. …”
    Thesis
  8. 2488

    Prediction of international rice production using long short- term memory and machine learning models by Arya, Suraj, Anju, ., Nor Azuana, Ramli

    Published 2025
    “…A total of nine ML and one DL models are trained and tested on the international dataset, which contains the rice production details of 192 countries over the last 62 years. Notably, linear regression and the LSTM algorithm predict rice production with the highest percentage of R-squared (R 2), 98.40% and 98.19%, respectively. …”
    Get full text
    Article
  9. 2489
  10. 2490
  11. 2491

    Effect of pore size distribution on the desalination performance of the selective layer of nanoporous atomically-thin membranes by Chow, Chun-Man, Karnik, Rohit

    Published 2024
    “…Over the last decade, molecular simulations and experiments have shown that nanoporous atomically-thin membranes (NATMs) have the potential for high-permeance, high-selectivity separations, including seawater desalination. …”
    Get full text
    Article
  12. 2492
  13. 2493

    Amplitude analysis of the radiative decay B0s → K+K−γ by Aaij, R., Abdelmotteleb, A. S. W., Abellan Beteta, C., Abudinén, F., Ackernley, T., Adefisoye, A. A., Adeva, B., Adinolfi, M., Adlarson, P., Agapopoulou, C., Aidala, C. A., Ajaltouni, Z., Akar, S., Akiba, K., Albicocco, P., Albrecht, J.

    Published 2024
    “….)+1.4−0.5(syst.)±0.5()%, where the last uncertainty is due to the ratio of measured branching fractions to the K+K− final state. …”
    Get full text
    Article
  14. 2494

    Chasing the city that cannot stop: Exploring transportation and urban co-development in São Paulo’s history by Borges Costa, Adriano, Zegras, P Christopher, Biderman, Ciro

    Published 2024
    “…The analysis illustrates how transportation investment choices have important consequences for urban growth, exerting long-lasting influences on its urban form.…”
    Get full text
    Article
  15. 2495

    Constraints on vowel-zero alternations in Hungarian by Takács, Dóra Kata

    Published 2024
    “…I analyze a large set of Hungarian nominal stems whose last vowel alternates with zero in certain contexts (Vago (1980), Siptár & Törkenczy (2000)): e.g. bokor [bokor], bokr-ok [bokr-ok]. …”
    Get full text
    Thesis
  16. 2496
  17. 2497

    It Is Time to Standardize Principles and Practices for Software Memory Safety by Watson, Robert, Baldwin, John, Chen, Tony, Chisnall, David, Clarke, Jessica, Davis, Brooks, Filardo, Nathaniel, Gutstein, Brett, Jenkinson, Graeme, Laurie, Ben, Mazzinghi, Alfredo, Moore, Simon, Neumann, Peter, Okhravi, Hamed, Rebert, Alex, Richardson, Alex, Sewell, Peter, Tratt, Laurence, Vijayaraghavan, Muralidaran, Vincent, Hugo, Witaszczyk, Konrad

    Published 2025
    “…In this Inside Risks column, we explore memory-safety standardization, which we argue is an essential step to promoting universal strong memory safety in government and industry, and, in turn, to ensure access to more secure software for all. During the last two decades, a set of research technologies for strong memory safety—memory-safe languages, hardware and software protection, formal approaches, and software compartmentalization—have reached sufficient maturity to see early deployment in security-critical use cases. …”
    Get full text
    Article
  18. 2498

    Comparison of multiple random walks strategies for searching networks by Zheng, Zhongtuan, Wang, Hanxing, Gao, Shengguo, Wang, Guoqiang

    Published 2014
    “…We show the convergence of the MFPT of the first arriving walker and find the MFPT of the last arriving walker closely related with the mean cover time. …”
    Get full text
    Get full text
    Journal Article
  19. 2499

    Book Mavens of Manila : an interpretative phenomenological analysis of contemporary niche publishers in the Philippines by Sagun, Karryl Kim Abella

    Published 2019
    “…My findings demonstrate that Darnton’s claim that the external forces influencing the life cycle of the book comprise a single entity is flawed. The last chapter, Chapter Nine, provides a summary of my work and its contributions, a discussion on its limitations, and suggestions for future research.…”
    Get full text
    Get full text
    Thesis-Doctor of Philosophy
  20. 2500

    Cyclic scheduling analysis of single-arm cluster tools with wafer residency time constraint and chamber cleaning operations by Yang, FaJun, Wu, NaiQi, Su, Rong, Qiao, Yan

    Published 2020
    “…By building timed Petri net model for the system, two linear programs are proposed to determine the minimal cycle time and test the existence of a feasible schedule. At last, an industrial example is used to demonstrate the obtained results.…”
    Get full text
    Conference Paper