Showing 121 - 140 results of 323 for search '((beers OR beer) OR (checkers OR check))', query time: 0.10s Refine Results
  1. 121

    Single-Shot Decoding of Good Quantum LDPC Codes by Gu, Shouzhen, Tang, Eugene, Caha, Libor, Choe, Shin Ho, He, Zhiyang, Kubica, Aleksander

    Published 2024
    “…Quantum Tanner codes constitute a family of quantum low-density parity-check codes with good parameters, i.e., constant encoding rate and relative distance. …”
    Get full text
    Article
  2. 122

    Blind recognition of LDPC code parameters over erroneous channel conditions by Ramabadran, Swaminathan, Madhukumar, A. S., Wang, Guohua, Ting, Shang Kee

    Published 2020
    “…In this study, blind estimation algorithms are proposed to identify code dimension and codeword length parameters of low-density parity-check (LDPC) codes at the receiver over noisy or erroneous channel conditions assuming a non-cooperative scenario. …”
    Get full text
    Journal Article
  3. 123

    Using deep learning for studying spread-F in the ionosphere by Luwanga, Christopher

    Published 2023
    “…Our work contributes in three key ways: 1) help other researchers quickly decide on the most suitable Spread F detection methodology, 2) provide publicly available labelled ionogram dataset for others to use to build their own SF classification models and 3) develop an interactive web application through which one can view ionograms, check whether a given ionogram has SF, as well as vote on already classified ionograms. …”
    Get full text
    Thesis-Doctor of Philosophy
  4. 124

    Selection of materials for biodegradable heart plug prototype by Anastasia Darwitan

    Published 2010
    “…In addition, MTS assays with L-929 and HUVEC cells were done to check the compatibility of the polymers with the cells. …”
    Get full text
    Final Year Project (FYP)
  5. 125

    Model-driven web-based decision support system design for airport terminal by Hu, Jin Peng.

    Published 2010
    “…Passengers handling facilities such as check-in counters, immigration counters and passengers dwell spaces such as the gate lounge are part of the airport landside components. …”
    Get full text
    Thesis
  6. 126

    Design and development of image processing algorithms for quantitative road traffic data analysis by Krishnalal Puthiya Veettil.

    Published 2013
    “…Results comparison between different segmentation methods was performed to check the best detection method. Edge detection techniques generally showed comparatively better results than other methods. …”
    Get full text
    Final Year Project (FYP)
  7. 127

    Heat transfer enhancement in drag-reducing channel flow by Yeo, Keng Hoo

    Published 2008
    “…In the present study, a two-dimensional water tunnel was designed and fabricated to investigate drag reduction by surfactant additives. Flow development check experiments were performed with different concentrations of surfactant additives to justify the fully developed flow conditions at the test section. …”
    Get full text
    Thesis
  8. 128

    Design of circular polarized micro-strip antenna by Shanmugam Bhaskar Vignesh

    Published 2016
    “…The antenna designed consists of a square patch with symmetric and asymmetric configurations in order to check the potential possibilities of getting a better performance, to improve the radiation pattern and more importantly to enhance the axial ratio. …”
    Get full text
    Thesis
  9. 129

    Measuring Leagile Supply Chain, Information Sharing, and Supply Chain Performance: Pre-Test and Pilot Test by Abdulameer, Susan Sabah, Yaacob, Noorulsadiqin Azbiya, Ibrahim, Yousif Munadhil

    Published 2020
    “…This assessment was done in two tests: the pre-test to establish the validity of the measures by experts and the pilot test to check the reliability of the measurements using SPSS.V.25. …”
    Get full text
    Article
  10. 130

    On the intermediate Jacobian of M5-branes by Jefferson, Patrick, Kim, Manki

    Published 2024
    “…Our formula for the Euler characteristic includes a conjectured correction term that accounts for the contributions of pointlike terminal ℤ2 singularities corresponding to perturbative O3-planes. We check our conjecture in a number of explicit examples and find perfect agreement with the results of direct computations.…”
    Get full text
    Article
  11. 131

    Triangular angle rigidity for distributed localization in 2D by Chen, Liangming

    Published 2022
    “…More importantly, inspired by Laman's theorem, we propose a topological, necessary and sufficient condition to check generic triangular angle rigidity. Based on the results on triangular angle rigidity, both algebraic and topological localizability conditions are developed, which are necessary and sufficient when the number of anchor nodes in the network is two. …”
    Get full text
    Journal Article
  12. 132

    Attack detection for cyber-physical systems: a zonotopic approach by Li, Jitao, Wang, Zhenhua, Shen, Yi, Xie, Lihua

    Published 2023
    “…Two approaches, namely, projection and polytopic conversion, are presented to check the intersection situation. The detection performance is quantified using a stealthy attack set and the corresponding state estimation error set. …”
    Get full text
    Journal Article
  13. 133

    A cloud-based data acquisition device by Goh, Reuben Zhi Yu

    Published 2023
    “…With this acute manpower shortage, building maintenance personnels are unable to constantly check on every system in the building. Hence, system breakdown occurs more frequently, this causes stress and inconvenience to the building occupants. …”
    Get full text
    Final Year Project (FYP)
  14. 134

    Interactive e-learning environment to build security camera by Lim, Angel Ke Hsin

    Published 2024
    “…A quiz was also developed using Unity to enhance the learning experience and check the understanding of each learner. At the end of this project, testing was also conducted to make sure that the objective was achieve, instructions are clear, and learners have a good learning experience.…”
    Get full text
    Final Year Project (FYP)
  15. 135

    Search in location based social network by Lew, Stephanie Yin Hui.

    Published 2013
    “…With the advent of geo-positioning technologies, it is possible for a user to be able to check-in his or her location information online, especially to location based social networks such as Foursquare and Twitter. …”
    Get full text
    Final Year Project (FYP)
  16. 136

    Setting TOU electricity tariffs for NTU electricity consumers by Goh, Michael Yeow Liang

    Published 2014
    “…Advanced metering infrastructure consists of smart meters which allow residential consumers to check real time electricity consumption which can implement different kind of tariff schemes other than the flat rate tariff scheme One of the price based programs is the time-of-use (TOU) rate tariff scheme. …”
    Get full text
    Final Year Project (FYP)
  17. 137

    The influence of nutrition on obesity by Ee, Xing Min

    Published 2015
    “…People in modern days consume copious amounts of carbohydrate-rich foods and sugary products, having the misconception that as long as their calorie intake is kept to a minimum, their weight would be kept in check as well. However, this notion only applies when carbohydrate intake is kept in control too. …”
    Get full text
    Final Year Project (FYP)
  18. 138

    Electrical design of signal conditioning and signal processing circuit for Rogowski coil by Francis, Antony Denisha

    Published 2016
    “…The fault current is sensed with the different models of the coil and feasibility check is discussed. Rogowski coil is mainly used for measuring alternating currents and the frequency response of the coil is higher compared to other current sensors like Current transformer, Shunt and Hall Effect sensors. …”
    Get full text
    Thesis
  19. 139

    Content routing and lookup schemes using global bloom filter for content-delivery-as-a-service by Jin, Yichao, Wen, Yonggang

    Published 2013
    “…The global CCBF adds our system with the capability to early check the existence of any specific content among all the peering surrogates, before any local checking on each cache node. …”
    Get full text
    Get full text
    Conference Paper
  20. 140

    Certifiers make neural networks vulnerable to availability attacks by Lorenz, T, Kwiatkowska, M, Fritz, M

    Published 2023
    “…Certifiers for neural networks are a reliable way to check the robustness of these predictions. They guarantee for some predictions that a certain class of manipulations or attacks could not have changed the outcome. …”
    Conference item