Search alternatives:
cars » care (Expand Search), car (Expand Search), sars (Expand Search)
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
crackers » trackers (Expand Search), cracker (Expand Search), cracks (Expand Search)
cars » care (Expand Search), car (Expand Search), sars (Expand Search)
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
crackers » trackers (Expand Search), cracker (Expand Search), cracks (Expand Search)
-
381
Ergativity in Tongan
Published 2000“…Following Chomsky (1993), I assume that a structural case is assigned by feature checking in a Spec-head configuration. I also assume that only one Agr can be active in intransitive constructions: Agrs in accusative languages and Agro in ergative languages (Bobaljik 1993). …”
Thesis -
382
Effect of Dactylaria higginsii on interference of Cyperus rotundus with L. esculentum
Published 1999“…At 106 conidia ml-1, D. higginsii reduced the interference from C. rotundus, controlled C. rotundus better, and increased L. esculentum yield compared to the weedy checks.…”
Article -
383
Mitigate the effect of distributed generators connected to distribution system.
Published 2022“…ETAP program is used for analyzing and checking the results obtained, where the operating time and TMS value of all relays in the system are calculated in case the distribution generators are not connected, and to ensure the quality of coordination by Etap software, then the distributive generators are connected, their effects are studied, and the relays are coordinated again by the two previous methods. …”
Get full text
Article -
384
Effective 5D BIM requirements for risk mitigation during pre-contract stage.
Published 2022“…Risk mitigation strategies are proposed to make a positive impact on the 5D BIM implementation, which consist of regular checks and balances, improve skills and knowledge through training and acquire suitable 5D BIM applications. …”
Get full text
Article -
385
Motor insurance : an analysis with comparison
Published 2014“…The rapid expansion of car ownership in Singapore in the last two decades, despite efforts by the government to curb car usage has led to a significant increase in the number of people killed or injured in automobile accidents.…”
Get full text
Final Year Project (FYP) -
386
Molecular beam epitaxy of dilute nitride indium antimonide materials for long wavelength infrared application
Published 2014“…The most advanced crystal growth technologies to date are utilized in the study: solid-source molecular beam epitaxy equipped with Sb valved cracker cell, CBr4 source, and N radio frequency (RF) plasma. …”
Get full text
Thesis -
387
Floquet Codes without Parent Subsystem Codes
Published 2024“…However, unlike the honeycomb code, it possesses an explicit CSS structure and its gauge checks do not form a subsystem code. Nevertheless, we show that our dynamic protocol conserves logical information and possesses a threshold for error correction. …”
Get full text
Article -
388
-
389
Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications
Published 2024“…Using that deployment, we showcase the protocols' applicability for two interesting applications, policy checking and wallet exchange, as well as their efficiency by demonstrating low gas costs and fees.…”
Get full text
Article -
390
Disrupting Monocultural Tendencies through Multimodal Montage
Published 2024“…As an Indian artist, the author situates her own practice within this discourse, highlighting projects such as `The Whistleblower' (2023), a tangible archive within an everyday object, and `A Mystery for You' (2023-24), a fact-checking game that merges a tangible interface with a large language model (LLM). …”
Get full text
Get full text
Thesis -
391
Mobile application for optical character recognition (OCR) of digits
Published 2021“…To further improve the recognition accuracy, an API is created for sanity checks based on the domain knowledge adopted from clinicians. …”
Get full text
Final Year Project (FYP) -
392
Towards explainable and semantically coherent claim extraction for an automated fact-checker
Published 2024“…Therefore, this project aims to enhance the claim extraction process of an automatic fact-checker, improve the accuracy of fact-checking, and mitigate the limitations associated with LLMs' reliance on outdated information. …”
Get full text
Final Year Project (FYP) -
393
Online game for Chinese chess
Published 2010“…Research from various sources such as internet, books and journals was done to enhance in understanding of the development of an online Chinese Chess game.The results had indicated that a simple move of a chess piece involves a lot of checking and consideration on the types of moves possible. …”
Get full text
Final Year Project (FYP) -
394
Three dimensional numerical manifold method and rock engineering applications
Published 2011“…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
Get full text
Thesis -
395
SCE17-0185: STIX representation of cyber threat intelligence
Published 2018“…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
Get full text
Final Year Project (FYP) -
396
15.571 Generating Business Value from Information Technology, Spring 2007
Published 2010“…The familiar components of the place: cash, checks, paper reports and documents, store fronts, and face to face meetings remain important, but less so. …”
Get full text
Learning Object -
397
A multidisciplinary survey of computational techniques for the modelling, simulation and analysis of biochemical networks
Published 2011“…From a practical point of view, in silico experiments can be performed that would be very expensive or impossible to achieve in the laboratory, such as hypothesis-testing with regards to knock-out experiments or overexpression, or checking the validity of a proposed molecular mechanism. …”
Get full text
Get full text
Journal Article -
398
Build your own Android App
Published 2020“…In a developed country like Singapore, finding a car park can be difficult during peak hours. There are a lot of car park android applications available on google store, however most of them provide the services such as user to find the nearby HDB car park in the list view which is not very user friendly. …”
Get full text
Final Year Project (FYP) -
399
Circuit board design and electric vehicle decoding
Published 2015“…Hence, CAN message decoding must be carried out before car hacking happened. The main objective of the project is to design a circuit board and perform C programming to establish communication between CAN bus in an electric vehicle and a personal computer (PC), as well as decode the CAN message received from the electric car. …”
Get full text
Thesis -
400
Sustainable and smart trip planner for reducing carbon footprint of transportation
Published 2022“…It provides the carbon footprint emission of each route and also analyses the car park availability in Singapore. This project designs a prediction model to provide the prediction of car park availability and reduces the time on the road while using the car. …”
Get full text
Final Year Project (FYP)