Search alternatives:
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), hackers (Expand Search)
checks » check (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), hackers (Expand Search)
checks » check (Expand Search)
-
141
Scenes of misrecognition (Koltès, Duras)
Published 2024“…What is most fascinating about these works is the curious way in which they appear to bear all the markings of confessions yet pointedly refuse to behave like them, thwarting the desire for revelation, catharsis, and closure at every turn. …”
Journal article -
142
Floquet Codes without Parent Subsystem Codes
Published 2024“…However, unlike the honeycomb code, it possesses an explicit CSS structure and its gauge checks do not form a subsystem code. Nevertheless, we show that our dynamic protocol conserves logical information and possesses a threshold for error correction. …”
Get full text
Article -
143
Mobile application for optical character recognition (OCR) of digits
Published 2021“…To further improve the recognition accuracy, an API is created for sanity checks based on the domain knowledge adopted from clinicians. …”
Get full text
Final Year Project (FYP) -
144
Taking data feminism to school: A synthesis and review of pre‐collegiate data science education projects
Published 2024“…In this review paper, we draw on principles from data feminism to review 42 different educational research and design approaches that engage youth with data, many of which are educational technology intensive and bear on future data-intensive educational technology research and design projects. …”
Get full text
Article -
145
Comparison of Machine Learning-Based Methods for Narrowband Blind Adaptive Beamforming
Published 2024“…Traditional blind source separation methods such as CMA, SOBI, JADE, and FastICA tend to be highly effective at beamforming datasets with moderate to large sample supports, but they do not perform well when they only have access to a limited number of data samples. They also bear the disadvantage that the appropriate algorithm must be selected based on the properties of the expected signal. …”
Get full text
Thesis -
146
Easing the “second-shift” burden : grandparental childcare and the subjective wellbeing of working mothers in Singapore
Published 2020“…However, it is still common for working mothers to bear the brunt of both domestic and paid work. In the present study, I explored the role of grandparents as providers of childcare for their grandchildren in contemporary Singapore. …”
Get full text
Final Year Project (FYP) -
147
The other side of the Elbe River: interventions in art, modernity, and coloniality in Poland
Published 2023“…<p>The artistic practices of Zofia Stryjeńska (1891-1976), Władysław Hasior, (1928-1999), Teresa Murak (1949-) and Roman Stańczak (1969-) all bear testimony – in their own distinct ways – to the ‘shock of the new’, the massive rupture brought by modernisation and capitalism in twentieth-century Poland. …”
Thesis -
148
Behave The Biology of Humans at Our Best and Worst /
Published 2017“…Sapolsky's storytelling concept is delightful but it also has a powerful intrinsic logic: he starts by looking at the factors that bear on a person's reaction in the precise moment a behavior occurs, and then hops back in time from there, in stages, ultimately ending up at the deep history of our species and its evolutionary legacy. …”
Get full text
software, multimedia -
149
A novel approach based on the elastoplastic fatigue damage and machine learning models for life prediction of aerospace alloy parts fabricated by additive manufacturing
Published 2022“…In the aerospace engineering, many metal parts produced using Additive Manufacturing (AM) technique often bear cyclic loadings, so the fatigue failures of AM alloy parts become very common phenomena. …”
Get full text
Journal Article -
150
N-heterocyclic carbene-catalyzed atroposelective annulation for access to thiazine derivatives with C-N axial chirality
Published 2021“…The obtained axially chiral thiazine derivative products bear multiple functional groups and are feasible for further transformations.…”
Get full text
Journal Article -
151
-
152
Center potential
Published 2023“…To ensure the safety and trustworthiness of tutors, this application incorporates a rigorous verification process, which includes background checks, identity verification, and qualification validation. …”
Get full text
Final Year Project (FYP) -
153
Application development on an Android smart-phone
Published 2012“…The application intercepts all incoming messages and checks them for a certain password which uniquely identifies the owner. …”
Get full text
Final Year Project (FYP) -
154
Evaluation and fabrication of damaged composite material using non-destructive testing
Published 2019“…Since composites are extensively employed in many areas, it is important to determine the existence of surface and sub-surface defects before production and during regular maintenance checks. As time goes on, wear and tear occur to a material. …”
Get full text
Final Year Project (FYP) -
155
Experiences, perceptions and ethical considerations of the malaria infection study in Thailand
Published 2025“…We found that although compensation was a motivation for participation, this was secondary to it being beneficial to self (health checks; link to health networks; building merit) and others (medical research contribution; altruism). …”
Journal article -
156
Three essays on frictions of trade
Published 2018“…The analysis is based on an adapted gravity model with several alternative specifications for robustness checks. The result suggests that improvements on the road network lead to trade expansion on both intensive and extensive margins, but the effects vary across the regions. …”
Thesis -
157
kboolnet: a toolkit for the verification, validation, and visualization of reaction-contingency (rxncon) models
Published 2023“…The verification script VerifyModel.R checks for responsiveness to repeated stimulations as well as consistency of steady state behavior. …”
Get full text
Article -
158
15.571 Generating Business Value from Information Technology, Spring 2007
Published 2010“…The familiar components of the place: cash, checks, paper reports and documents, store fronts, and face to face meetings remain important, but less so. …”
Get full text
Learning Object -
159
Cooperative collision avoidance in multirobot systems using fuzzy rules and velocity obstacles
Published 2023“…In detail, at any time instant, a robot checks the robots that it may collide with and retrieves the most dangerous robot in each sector based on the predicted collision time; then, the robot generates its velocity in real-time via fuzzy inference and VO-based fine-tuning. …”
Get full text
Journal Article -
160
Our weapons, our problem: arms exports, democracy and civil society in Brazil and the UK
Published 2019“…The causal mechanism is in part explained by activities conducted by norm entrepreneurs, whose emergence is facilitated by the existence of institutions commonly found in democratic countries, especially a system of checks and balances, contested elections, and political and civil liberties. …”
Thesis