Search alternatives:
ceers » cheers (Expand Search), peers (Expand Search), cers (Expand Search)
beers » peers (Expand Search), bears (Expand Search), bers (Expand Search), beenrs (Expand Search), beens (Expand Search)
bees » been (Expand Search), sees (Expand Search), fees (Expand Search), beens (Expand Search)
bee » been (Expand Search)
beer » beenr (Expand Search), been (Expand Search), peer (Expand Search), bear (Expand Search)
checks » check (Expand Search)
ceers » cheers (Expand Search), peers (Expand Search), cers (Expand Search)
beers » peers (Expand Search), bears (Expand Search), bers (Expand Search), beenrs (Expand Search), beens (Expand Search)
bees » been (Expand Search), sees (Expand Search), fees (Expand Search), beens (Expand Search)
bee » been (Expand Search)
beer » beenr (Expand Search), been (Expand Search), peer (Expand Search), bear (Expand Search)
checks » check (Expand Search)
-
361
Membrane compaction in forward osmosis process
Published 2021“…The TFC membranes were continuously tested in FO experiments for 24 h by using DI water as feed and NaCl solutions of different concentrations as draw solution, and their performances were checked again using fresh feed solutions. At the end of FO experiments, all TFC membranes experienced water flux and salt flux decline to different extents. …”
Get full text
Journal Article -
362
Practical relay code design based on protograph codes
Published 2018“…The low-density parity-check (LDPC) code design for three-terminal (namely, source, relay, and destination) relay network while considering decode-and-forward protocol is studied. …”
Get full text
Get full text
Journal Article -
363
Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications
Published 2024“…Using that deployment, we showcase the protocols' applicability for two interesting applications, policy checking and wallet exchange, as well as their efficiency by demonstrating low gas costs and fees.…”
Get full text
Article -
364
Transverse momentum-dependent heavy-quark fragmentation at next-to-leading order
Published 2024“…Our final results in position space agree with those of a recent calculation by another group that used a highly orthogonal organization of singularities in the intermediate momentum-space steps, providing a strong independent cross check. As an immediate application, we present the complete quark mass dependence of the energy-energy correlator (EEC) in the back-to-back limit at (𝛼𝑠).…”
Get full text
Article -
365
Disrupting Monocultural Tendencies through Multimodal Montage
Published 2024“…As an Indian artist, the author situates her own practice within this discourse, highlighting projects such as `The Whistleblower' (2023), a tangible archive within an everyday object, and `A Mystery for You' (2023-24), a fact-checking game that merges a tangible interface with a large language model (LLM). …”
Get full text
Get full text
Thesis -
366
Social tags as news event detectors
Published 2013“…Relative frequencies of the top 200 most frequently-used tags were analysed to check for spikes and bursts. Based on the results, four main findings emerged. …”
Get full text
Get full text
Journal Article -
367
Development of a mobile app for the thermal design of heat exchangers
Published 2021“…These include the fouling calculations and the flow-induced vibration check. The design of a STHE is extremely complicated and is a tedious process with many required calculations. …”
Get full text
Final Year Project (FYP) -
368
Crowd monitoring and detection
Published 2022“…However, it requires a lot of manpower to check the scanning pass and vaccination status which always lead to a long queue and make social distance hard to maintain. …”
Get full text
Final Year Project (FYP) -
369
A fuzzy rough number extended AHP and VIKOR for failure mode and effects analysis under uncertainty
Published 2022“…A practical case study of the check valve is provided to validate the applicability of the proposed FMEA. …”
Get full text
Journal Article -
370
Non-normal distribution of residual flexural strengths of steel fiber reinforced concretes and its impacts on design and conformity assessment
Published 2022“…The logarithmic transformation provides a practical and convenient approach to design and to check the conformity of log-normally distributed SFRC properties adopting existing criteria. …”
Get full text
Journal Article -
371
CT sigma delta ADC for audio applications
Published 2009“…The non-idealities simulation was extensively run to check how much the overall system can take non-idealities behaviors of gain, gain bandwidth, slew-rate and linearity while meeting performance requirements. …”
Get full text
Final Year Project (FYP) -
372
Towards explainable and semantically coherent claim extraction for an automated fact-checker
Published 2024“…Therefore, this project aims to enhance the claim extraction process of an automatic fact-checker, improve the accuracy of fact-checking, and mitigate the limitations associated with LLMs' reliance on outdated information. …”
Get full text
Final Year Project (FYP) -
373
An ultra low-power precision sample-and-hold circuit for biomedical application
Published 2010“…The parameters that were used to check the precision of the S/H circuit are hold pedestal and total harmonic distortion. …”
Get full text
Final Year Project (FYP) -
374
Online game for Chinese chess
Published 2010“…Research from various sources such as internet, books and journals was done to enhance in understanding of the development of an online Chinese Chess game.The results had indicated that a simple move of a chess piece involves a lot of checking and consideration on the types of moves possible. …”
Get full text
Final Year Project (FYP) -
375
Three dimensional numerical manifold method and rock engineering applications
Published 2011“…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
Get full text
Thesis -
376
Eye movement feature extraction for driver vigilance classification
Published 2015“…Analysis of variance (ANOVA) test was employed to check if there exist significant differences among three stages within one driving period. …”
Get full text
Final Year Project (FYP) -
377
SCE17-0185: STIX representation of cyber threat intelligence
Published 2018“…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
Get full text
Final Year Project (FYP) -
378
A signal through the noise: accurate determination of hydrogen atom positions in crystal structures and optimisation of Laue neutron diffraction methods
Published 2021“…This focuses on:</p> <p>Recommendations for the efficient collection of Laue neutron data, in order to optimise the data set completeness and awarded beam-time; strategic considerations for how to best answer the scientific question(s) at hand in a Laue neutron experiment, whilst planning against future contingencies; improving methods for crystal packing and shipping, particularly for air and moisture sensitive materials; discussing issues arising from ice forming on the crystal during a Laue neutron diffraction experiment, and methods for minimising this problem; more effectively modelling disorder using ring shapes, in the crystallographic refinement package CRYSTALS; providing rationale for Laue neutron specific checkCIF comments.</p> <p>Alongside the aforementioned research projects, the relevant history and theory contextualising the crystallographic methods used is presented.…”
Thesis -
379
A random-key genetic algorithm-based method for transportation network vulnerability envelope analysis under simultaneous multi-link disruptions
Published 2024“…Specifically, the TNVE problem can be formulated as a binary integer bi-level program (BLP), in which the upper-level problem maximizes/minimizes the remaining network performance under a given number of disrupted links, and the lower-level problem adopts the shortest path problem to check the post-disruption connectivity of each origin–destination (O-D) pair while circumventing the cumbersome path enumeration or path set pre-generation. …”
Journal article -
380
Integration of genetic data and genomic annotation in the analysis of genome wide association studies
Published 2017“…To fine map these loci and assign functional annotation, I created Bayesian credible sets and checked for overlap between SNPs in these credible sets and regulatory marks in the Encyclopaedia of DNA Elements (ENCODE) database. …”
Thesis