Showing 361 - 380 results of 441 for search '((ceers OR ((beers OR (bees OR bee)) OR beer)) OR checks)*', query time: 0.14s Refine Results
  1. 361

    Membrane compaction in forward osmosis process by Ng, Daniel Yee Fan, Chen, Yunfeng, Dong, Zhili, Wang, Rong

    Published 2021
    “…The TFC membranes were continuously tested in FO experiments for 24 h by using DI water as feed and NaCl solutions of different concentrations as draw solution, and their performances were checked again using fresh feed solutions. At the end of FO experiments, all TFC membranes experienced water flux and salt flux decline to different extents. …”
    Get full text
    Journal Article
  2. 362

    Practical relay code design based on protograph codes by Noor-A-Rahim, Md., Ali, G.G.Md. Nawaz, Guan, Yong Liang

    Published 2018
    “…The low-density parity-check (LDPC) code design for three-terminal (namely, source, relay, and destination) relay network while considering decode-and-forward protocol is studied. …”
    Get full text
    Get full text
    Journal Article
  3. 363

    Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications by Zyskind, Guy, Yanai, Avishay, Pentland, Alex

    Published 2024
    “…Using that deployment, we showcase the protocols' applicability for two interesting applications, policy checking and wallet exchange, as well as their efficiency by demonstrating low gas costs and fees.…”
    Get full text
    Article
  4. 364

    Transverse momentum-dependent heavy-quark fragmentation at next-to-leading order by von Kuk, Rebecca, Michel, Johannes K. L., Sun, Zhiquan

    Published 2024
    “…Our final results in position space agree with those of a recent calculation by another group that used a highly orthogonal organization of singularities in the intermediate momentum-space steps, providing a strong independent cross check. As an immediate application, we present the complete quark mass dependence of the energy-energy correlator (EEC) in the back-to-back limit at (𝛼𝑠).…”
    Get full text
    Article
  5. 365

    Disrupting Monocultural Tendencies through Multimodal Montage by Singha, Mrinalini

    Published 2024
    “…As an Indian artist, the author situates her own practice within this discourse, highlighting projects such as `The Whistleblower' (2023), a tangible archive within an everyday object, and `A Mystery for You' (2023-24), a fact-checking game that merges a tangible interface with a large language model (LLM). …”
    Get full text
    Get full text
    Thesis
  6. 366

    Social tags as news event detectors by Chua, Alton Yeow Kuan, Razikin, Khasfariyati, Goh, Dion Hoe-Lian

    Published 2013
    “…Relative frequencies of the top 200 most frequently-used tags were analysed to check for spikes and bursts. Based on the results, four main findings emerged. …”
    Get full text
    Get full text
    Journal Article
  7. 367

    Development of a mobile app for the thermal design of heat exchangers by Yap, Shi Kai

    Published 2021
    “…These include the fouling calculations and the flow-induced vibration check. The design of a STHE is extremely complicated and is a tedious process with many required calculations. …”
    Get full text
    Final Year Project (FYP)
  8. 368

    Crowd monitoring and detection by Li, Xin

    Published 2022
    “…However, it requires a lot of manpower to check the scanning pass and vaccination status which always lead to a long queue and make social distance hard to maintain. …”
    Get full text
    Final Year Project (FYP)
  9. 369

    A fuzzy rough number extended AHP and VIKOR for failure mode and effects analysis under uncertainty by Zhu, Guoniu, Ma, Jin, Hu, Jie

    Published 2022
    “…A practical case study of the check valve is provided to validate the applicability of the proposed FMEA. …”
    Get full text
    Journal Article
  10. 370

    Non-normal distribution of residual flexural strengths of steel fiber reinforced concretes and its impacts on design and conformity assessment by He, Shan, Yang, En-Hua

    Published 2022
    “…The logarithmic transformation provides a practical and convenient approach to design and to check the conformity of log-normally distributed SFRC properties adopting existing criteria. …”
    Get full text
    Journal Article
  11. 371

    CT sigma delta ADC for audio applications by Hnin, Hnin Soe.

    Published 2009
    “…The non-idealities simulation was extensively run to check how much the overall system can take non-idealities behaviors of gain, gain bandwidth, slew-rate and linearity while meeting performance requirements. …”
    Get full text
    Final Year Project (FYP)
  12. 372

    Towards explainable and semantically coherent claim extraction for an automated fact-checker by Yoswara, Jocelyn Valencia

    Published 2024
    “…Therefore, this project aims to enhance the claim extraction process of an automatic fact-checker, improve the accuracy of fact-checking, and mitigate the limitations associated with LLMs' reliance on outdated information. …”
    Get full text
    Final Year Project (FYP)
  13. 373

    An ultra low-power precision sample-and-hold circuit for biomedical application by Mah, Sai Lei

    Published 2010
    “…The parameters that were used to check the precision of the S/H circuit are hold pedestal and total harmonic distortion. …”
    Get full text
    Final Year Project (FYP)
  14. 374

    Online game for Chinese chess by Lee, Jia Woei.

    Published 2010
    “…Research from various sources such as internet, books and journals was done to enhance in understanding of the development of an online Chinese Chess game.The results had indicated that a simple move of a chess piece involves a lot of checking and consideration on the types of moves possible. …”
    Get full text
    Final Year Project (FYP)
  15. 375

    Three dimensional numerical manifold method and rock engineering applications by He, Lei

    Published 2011
    “…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
    Get full text
    Thesis
  16. 376

    Eye movement feature extraction for driver vigilance classification by Fu, Zhuxuan

    Published 2015
    “…Analysis of variance (ANOVA) test was employed to check if there exist significant differences among three stages within one driving period. …”
    Get full text
    Final Year Project (FYP)
  17. 377

    SCE17-0185: STIX representation of cyber threat intelligence by Phua, Kin Wee

    Published 2018
    “…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
    Get full text
    Final Year Project (FYP)
  18. 378

    A signal through the noise: accurate determination of hydrogen atom positions in crystal structures and optimisation of Laue neutron diffraction methods by Sackman, GA

    Published 2021
    “…This focuses on:</p> <p>Recommendations for the efficient collection of Laue neutron data, in order to optimise the data set completeness and awarded beam-time; strategic considerations for how to best answer the scientific question(s) at hand in a Laue neutron experiment, whilst planning against future contingencies; improving methods for crystal packing and shipping, particularly for air and moisture sensitive materials; discussing issues arising from ice forming on the crystal during a Laue neutron diffraction experiment, and methods for minimising this problem; more effectively modelling disorder using ring shapes, in the crystallographic refinement package CRYSTALS; providing rationale for Laue neutron specific checkCIF comments.</p> <p>Alongside the aforementioned research projects, the relevant history and theory contextualising the crystallographic methods used is presented.…”
    Thesis
  19. 379

    A random-key genetic algorithm-based method for transportation network vulnerability envelope analysis under simultaneous multi-link disruptions by Gu, Y, Ryu, S, Xu, Y, Chen, A, Chan, H-Y, Xu, X

    Published 2024
    “…Specifically, the TNVE problem can be formulated as a binary integer bi-level program (BLP), in which the upper-level problem maximizes/minimizes the remaining network performance under a given number of disrupted links, and the lower-level problem adopts the shortest path problem to check the post-disruption connectivity of each origin–destination (O-D) pair while circumventing the cumbersome path enumeration or path set pre-generation. …”
    Journal article
  20. 380

    Integration of genetic data and genomic annotation in the analysis of genome wide association studies by Ng, E

    Published 2017
    “…To fine map these loci and assign functional annotation, I created Bayesian credible sets and checked for overlap between SNPs in these credible sets and regulatory marks in the Encyclopaedia of DNA Elements (ENCODE) database. …”
    Thesis