Search alternatives:
car » coar (Expand Search), care (Expand Search)
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
checkers » checks (Expand Search), hackers (Expand Search), crackers (Expand Search)
car » coar (Expand Search), care (Expand Search)
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
checkers » checks (Expand Search), hackers (Expand Search), crackers (Expand Search)
-
481
Online game for Chinese chess
Published 2010“…Research from various sources such as internet, books and journals was done to enhance in understanding of the development of an online Chinese Chess game.The results had indicated that a simple move of a chess piece involves a lot of checking and consideration on the types of moves possible. …”
Get full text
Final Year Project (FYP) -
482
Three dimensional numerical manifold method and rock engineering applications
Published 2011“…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
Get full text
Thesis -
483
Eye movement feature extraction for driver vigilance classification
Published 2015“…Analysis of variance (ANOVA) test was employed to check if there exist significant differences among three stages within one driving period. …”
Get full text
Final Year Project (FYP) -
484
SCE17-0185: STIX representation of cyber threat intelligence
Published 2018“…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
Get full text
Final Year Project (FYP) -
485
A signal through the noise: accurate determination of hydrogen atom positions in crystal structures and optimisation of Laue neutron diffraction methods
Published 2021“…This focuses on:</p> <p>Recommendations for the efficient collection of Laue neutron data, in order to optimise the data set completeness and awarded beam-time; strategic considerations for how to best answer the scientific question(s) at hand in a Laue neutron experiment, whilst planning against future contingencies; improving methods for crystal packing and shipping, particularly for air and moisture sensitive materials; discussing issues arising from ice forming on the crystal during a Laue neutron diffraction experiment, and methods for minimising this problem; more effectively modelling disorder using ring shapes, in the crystallographic refinement package CRYSTALS; providing rationale for Laue neutron specific checkCIF comments.</p> <p>Alongside the aforementioned research projects, the relevant history and theory contextualising the crystallographic methods used is presented.…”
Thesis -
486
A random-key genetic algorithm-based method for transportation network vulnerability envelope analysis under simultaneous multi-link disruptions
Published 2024“…Specifically, the TNVE problem can be formulated as a binary integer bi-level program (BLP), in which the upper-level problem maximizes/minimizes the remaining network performance under a given number of disrupted links, and the lower-level problem adopts the shortest path problem to check the post-disruption connectivity of each origin–destination (O-D) pair while circumventing the cumbersome path enumeration or path set pre-generation. …”
Journal article -
487
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…SA-EADC adds another phase as “sensor redundancy check and activation” to EADC. It identifies the redundant sensor nodes, whose sensing coverage area are also covered completely by their direct neighbors and turns off them. …”
Get full text
Thesis -
488
15.571 Generating Business Value from Information Technology, Spring 2007
Published 2010“…The familiar components of the place: cash, checks, paper reports and documents, store fronts, and face to face meetings remain important, but less so. …”
Get full text
Learning Object -
489
A multidisciplinary survey of computational techniques for the modelling, simulation and analysis of biochemical networks
Published 2011“…From a practical point of view, in silico experiments can be performed that would be very expensive or impossible to achieve in the laboratory, such as hypothesis-testing with regards to knock-out experiments or overexpression, or checking the validity of a proposed molecular mechanism. …”
Get full text
Get full text
Journal Article -
490
Comparing analytical, micromagnetic and statistical channel models at 4 Tcbpsi patterned media recording
Published 2013“…In this work, we adapt the GFP model for BPMR and perform a comparison between densities predicted via the analytical and GFP models, by processing the signals from these models with the appropriate detectors and LDPC (low density parity check) decoders.…”
Get full text
Get full text
Journal Article -
491
What We Should Do Before the Social Bots Take Over: Online Privacy Protection and the Political Economy of Our Near Future
Published 2020“…U.S. states have passed laws to address self-driving cars on public roads (Marcus 2012). And nearer the subject of this paper, the legality of search engine bots (web crawlers) has been openly questioned on grounds of intellectual property protection and trespassing (Plitch 2002). …”
Get full text
Presentation -
492
-
493
An optimal scheduling scheme for electric vehicles in smarts grids
Published 2020“…Over the past ten years, the use of electric cars has risen rapidly. While charging a huge amount of electric vehicles at the same time or during peak hours might affect the electrical grid because of the sudden surge of electric demand. …”
Get full text
Final Year Project (FYP) -
494
Lane-aware image enhancement for lane detection in rain (part A)
Published 2022“…In this project, we mainly developed two methods to detect objects on the road, such as trucks, passenger cars, road signs, etc. The first method is to use Faster R-CNN algorithm to test rainy images; the second method is to use SDD algorithm to test dataset. …”
Get full text
Thesis-Master by Coursework -
495
FPS-Net: a convolutional fusion network for large-scale LiDAR point cloud segmentation
Published 2022“…Scene understanding based on LiDAR point cloud is an essential task for autonomous cars to drive safely, which often employs spherical projection to map 3D point cloud into multi-channel 2D images for semantic segmentation. …”
Get full text
Journal Article -
496
Improved thermomechanical and viscoelasticity properties of bio-epoxy/date palm fiber composite by addition of eggshell particles
Published 2023“…This research aims to check the influent of ES filler on thermal and viscoelasticity properties of bio-epoxy composite with incorporation of 40 wt.% date palm (DP) fiber. …”
Get full text
Article -
497
Identification of electromagnetic pre-earthquake perturbations from the DEMETER data by machine learning
Published 2021“…In this paper, we explore 16 spot-checking classification algorithms, among which, the top classifier with low-frequency power spectra of electric and magnetic fields was used for ionospheric perturbation analysis. …”
Get full text
Journal Article -
498
Mediation effects of language anxiety and prior learning experience on academic speaking challenges and strategies among Libyan students in Malaysian universities
Published 2023“…Field notes and member checks were used for validation. Correlational procedures, structural equation modeling (SEM), and bootstrapping resampling analyses were conducted to examine the relationships between variables, validate study models, and test research hypotheses. …”
Get full text
Article -
499
-
500
What information really matters in supervisor reduction?
Published 2020“…One strategy is to reduce the size of a supervisor to generate a control equivalent version, whose size is optimistically much smaller than the original one so that a user or control designer can easily check whether a designed controller fulfils its objectives and requirements. …”
Get full text
Journal Article