Showing 261 - 280 results of 1,077 for search '((bhone OR (borne OR bound)) OR choon)'s', query time: 0.13s Refine Results
  1. 261

    Selective catalytic sp3 C–O bond cleavage with C–N bond formation in 3-alkoxy-1-propanols by Chen, Cheng, Hong, Soon Hyeok

    Published 2013
    “…Based on the experimental results, O-bound and C-bound Ru enolate complexes were proposed as key intermediates for the unique selective sp3 C–O bond cleavage in 3-alkoxy-1-propanols.…”
    Get full text
    Get full text
    Journal Article
  2. 262

    A plane measuring device by Criminisi, A, Reid, I, Zisserman, A

    Published 1999
    “…This expression is valid if the matrix is over determined and also if the minimum number of correspondences are used. A bound on the errors of the first order approximations involved is also derived.…”
    Conference item
  3. 263

    High-performance and low-complexity implementation of fixed-coefficient FIR filters by Lou, Xin

    Published 2016
    “…The possible trade-off between the lower bound of critical path delay and area complexity is also discussed. …”
    Get full text
    Thesis
  4. 264

    Arabization, the victimizer: a constructivist analysis of the role of Arabization in harming social security and social cohesion in Singapore by Shukul, Raaj Kumar

    Published 2023
    “…Given that religion often shapes the values, norms and worldviews of individuals, being able to identify and even counter such nefarious attempts of agitating the Malay-Muslim community against the Other will (1) empower them to know the nuances between politics and religion without acting on illegitimate agendas being advocated for by such non-state actors; (2) Allow for the contextualized and accurate interpretations of religious tenets amongst various demographics within the Malay-Muslim community in Singapore and lastly, (3) serve as a significant model of the appreciation and practice of Islam within the Nusantara region that allows for a strengthening of our social fabric, social security and social cohesion borne out of a sincere and informed appreciation of Islam.…”
    Get full text
    Thesis-Master by Coursework
  5. 265

    CanSat, satellite in a soda can by Koh, Jian Cheng

    Published 2014
    “…This is to allow longer air-borne time for the sensors installed on the CanSat to collect data and also to reduce hardware damage. …”
    Get full text
    Final Year Project (FYP)
  6. 266

    Acoustic valley edge states in a graphene-like resonator system by Yang, Yahui, Yang, Zhaoju, Zhang, Baile

    Published 2019
    “…The concept of valley physics, as inspired by the recent development in valleytronic materials, has been extended to acoustic crystals for manipulation of air-borne sound. Many valleytronic materials follow the model of a gapped graphene. …”
    Get full text
    Get full text
    Journal Article
  7. 267

    Environmental health risks and well-being among the Orang Asli in Peninsular Malaysia: a review by Yew, Wong Chin

    Published 2024
    “…The review findings of selected literatures indicate that the primary issues were parasite infection and drinking water tainted with heavy metals and germs. Water-borne infections and other infectious diseases have been epidemiologically linked to these environmental conditions. …”
    Get full text
    Article
  8. 268

    Mapping psychosocial capital, commitment, and crisis self efficacy for improving VUCA e-learning environment by Mad Baguri, Ezza, Roslan, Samsilah, Hassan, Siti Aishah, Krauss, Steven Eric, Taresh, Sahar M.

    Published 2023
    “…This transition has also magnified existing disparities in access to educational resources, further intensifying the burdens borne by teachers, ultimately influencing their dedication and emotional well-being. …”
    Get full text
    Article
  9. 269

    Separating quantum communication and approximate rank by Anshu, Anurag, Garg, Ankit, Kothari, Robin, Ben-David, Shalev, Jain, Rahul, Lee, Troy

    Published 2018
    “…One of the best lower bound methods for the quantum communication complexity of a function H (with or without shared entanglement) is the logarithm of the approximate rank of the communication matrix of H. …”
    Get full text
    Get full text
    Journal Article
  10. 270

    On linear complementary pairs of codes by Solé, Patrick, Carlet, Claude, Güneri, Cem, Özbudak, Ferruh, Özkaya, Buket

    Published 2019
    “…Finally, a linear programming bound is obtained for binary LCP of codes and a table of values from this bound is presented in the case d(C) = d(D⊥). …”
    Get full text
    Get full text
    Journal Article
  11. 271

    On semidefinite programming relaxations of the traveling salesman problem by De Klerk, Etienne., Pasechnik, Dmitrii V., Sotirov, Renata.

    Published 2009
    “…Kovačević-Vujčić, Semidefinite programming methods for the symmetric traveling salesman problem, in Proceedings of the 7th International IPCO Conference on Integer Programming and Combinatorial Optimization, Springer-Verlag, London, UK, 1999, pp. 126–136]. Unlike the bound of Cvetković et al., the new SDP bound is not dominated by the Held–Karp linear programming bound, or vice versa.…”
    Get full text
    Get full text
    Get full text
    Journal Article
  12. 272
  13. 273
  14. 274

    Planning with object creation by Corrêa, AB, De Giacomo, G, Helmert, M, Rubin, S

    Published 2024
    “…This may impact the performance of planners, and it requires the domain expert to bound the number of required objects beforehand, which can be a challenge. …”
    Conference item
  15. 275

    Combinatorial algorithms for scheduling jobs to minimize server usage time by Ren, Runtian

    Published 2018
    “…For the general case where jobs can have arbitrary sizes, we first establish a non-trivial lower bound on the optimal solution. Based on this lower bound, we develop a 5-approximation algorithm in the offline setting. …”
    Get full text
    Get full text
    Thesis
  16. 276

    Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / by Yadav, Satya Prakash, editor 656347, Singh, Raghuraj, editor 656348, Yadav, Vibhash, editor 656349, Al-Turjman, Fadi, editor 622956, Kumar, Swarn Avinash, editor 656350, De Gruyter (Online service) 654067

    Published [202
    “…One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum computers are able to compute at full speed. …”
    Get full text
    software, multimedia
  17. 277

    Minimum variance benchmark for performance assessment of decentralized controllers by Sendjaja, Antonius Yudi, Kariwala, Vinay

    Published 2013
    “…In this paper, we present a method for computing a lower bound on the least output variance achievable using decentralized controllers, where the nonconvexity of the optimization problem is handled using sums of squares programming. …”
    Get full text
    Get full text
    Journal Article
  18. 278

    The rickettsial effector Sca4 has a conserved interaction with host clathrin and a tick cell specific role in infection by Vondrak, Cassandra Joan

    Published 2024
    “…Rickettsia species are obligate intracellular bacteria that cause vector-borne diseases that constitute an ongoing public health threat. …”
    Get full text
    Get full text
    Thesis
  19. 279

    Materials approaches for next-generation encapsulated cell therapies by Krishnan, Siddharth R., Langer, Robert, Anderson, Daniel G.

    Published 2024
    “…Transplanted cells can act as living drug factories capable of secreting therapeutic proteins in vivo, with applications in the treatment of Type 1 diabetes (T1D), blood borne disease, vision disorders, and degenerative neural disease, potentially representing functional cures for chronic conditions. …”
    Get full text
    Article
  20. 280

    TraceTogether : pandemic response, democracy, and technology by Stevens, Hallam, Haines, Monamie Bhadra

    Published 2020
    “…However, by deploying these within a context that centralizes data, the app turns ideals borne of dissent and protest on their head, using them to build trust not within a community but rather in government power and control. …”
    Get full text
    Journal Article