Showing 321 - 340 results of 7,362 for search '((ceers OR ((near OR bears) OR peers)) OR (checks OR check))*', query time: 0.16s Refine Results
  1. 321

    Evaluation and fabrication of damaged composite material using non-destructive testing by Lai, Abigail Jang Wai

    Published 2019
    “…Since composites are extensively employed in many areas, it is important to determine the existence of surface and sub-surface defects before production and during regular maintenance checks. As time goes on, wear and tear occur to a material. …”
    Get full text
    Final Year Project (FYP)
  2. 322

    Experiences, perceptions and ethical considerations of the malaria infection study in Thailand by Naemiratch, B, Kulpijit, N, Ruangkajorn, S, Day, NPJ, Prachumsri, J, Cheah, PY

    Published 2025
    “…We found that although compensation was a motivation for participation, this was secondary to it being beneficial to self (health checks; link to health networks; building merit) and others (medical research contribution; altruism). …”
    Journal article
  3. 323

    Three essays on frictions of trade by Li, W

    Published 2018
    “…The analysis is based on an adapted gravity model with several alternative specifications for robustness checks. The result suggests that improvements on the road network lead to trade expansion on both intensive and extensive margins, but the effects vary across the regions. …”
    Thesis
  4. 324
  5. 325

    Functional genetics of cancer and congenital disorders by Zak, J

    Published 2016
    “…An integrative analysis of cancer genomic data revealed that <em>PPP1R13B</em>, encoding ASPP1, bears many hallmarks of a tumour suppressor gene, despite being mutated at a low absolute frequency. …”
    Thesis
  6. 326

    Content routing and lookup schemes using global bloom filter for content-delivery-as-a-service by Jin, Yichao, Wen, Yonggang

    Published 2013
    “…The global CCBF adds our system with the capability to early check the existence of any specific content among all the peering surrogates, before any local checking on each cache node. …”
    Get full text
    Get full text
    Conference Paper
  7. 327

    A study of periodic behaviors by Doan Manh, Hiep

    Published 2014
    “…It is our belief that the model is directly applicable in mining periodic behaviors for moving users of telecommunication companies with their GPS data or moving users of location-based social networks with their check-in data.…”
    Get full text
    Final Year Project (FYP)
  8. 328

    A study to minimize 'A'-pillar blind spot in cars by Choo, Daryl Gavin Jun Yan

    Published 2018
    “…The solution proposals seek to help drivers check the blind spot passively without requiring them to look around the A-pillar. …”
    Get full text
    Final Year Project (FYP)
  9. 329

    Preparation and characterisation of smart polymer gels for wearable electronics by Shen, Clarence Xuanyi

    Published 2018
    “…The dielectric layer that was fabricated with a catechol-group polymer and Ionic Liquid, had shown healing capabilities when placed under conditions at 100°C for 10 minutes. Furthermore, a check on the capacitance value had shown that these dielectric layers functioned at above 1μF/𝑐𝑚2 at 20Hz, which are high capacitance values. …”
    Get full text
    Final Year Project (FYP)
  10. 330

    Clouds and hazes in Saturn's troposphere and stratosphere by Merlet, CTC

    Published 2013
    “…The haze physical and optical properties can however be independently retrieved from VIMS near-infrared spectra at shorter wavelengths in the 0.8-3.5 <em>μ</em>m spectral range. …”
    Thesis
  11. 331

    Universal resilience patterns in labor markets by Moro, Esteban, Frank, Morgan R., Pentland, Alex, Rutherford, Alex, Cebrian, Manuel, Rahwan, Iyad

    Published 2021
    “…Further, cities that increase their job connectivity see increasing wage bills, and workers of embedded occupations enjoy higher wages than their peers elsewhere. Finally, we show how job connectivity may clarify the augmenting and deleterious impact of automation in US cities. …”
    Get full text
    Article
  12. 332

    The epistemic significance of religious disagreements: cases of unconfirmed superiority disagreements by Choo, Frederick Wen Yeong

    Published 2022
    “…In this paper, I argue that many religious disagreements are cases of unconfirmed superiority disagreements, where parties have good reason to think they are not epistemic peers, yet they lack good reason to determine who is superior. …”
    Get full text
    Journal Article
  13. 333

    Magical realism and representations of the cold war in Southeast Asia by Lye, Kit Ying

    Published 2016
    “…However, while there are acknowledgements by scholars that religious myths and pre-existing animistic beliefs continue to influence the way that the indigenous people understand their worlds, Southeast Asian authors (unlike many of their postcolonial peers), do not actively employ magical realism in their exploration of history and civil unrest in their writings, and when they do, are not employed to the same degree as postcolonial authors in other regions. …”
    Get full text
    Thesis
  14. 334

    Ideas of intelligence across development : a look into children's implicit attitudes of the male = brilliant stereotype by Ng, Sara Hui Xin

    Published 2018
    “…These results prompt for further exploration of other possible factors such as cultural influences and other socialising agents such as teachers and peers that could have a greater influence on children’s development of this gender stereotype.…”
    Get full text
    Final Year Project (FYP)
  15. 335

    A highly strained Al-Al σ-bond in dianionic aluminum analog of oxirane for molecule activation by Koshino, Kota, Kinjo, Rei

    Published 2022
    “…Since aluminum is the most electropositive element among the p-block elements, the construction of molecules bearing a dianionic Al-Al σ-bond is inherently highly challenging. …”
    Get full text
    Journal Article
  16. 336

    State-feedback control design for polynomial discrete-time systems obtained via second-order Runge-Kutta discretization by Guedes, Priscila F.S., Lacerda, Marcio J., Nepomuceno, Erivelton G.

    Published 2024
    “…The sum of squares formulation was used to check the constraints. Two approaches are presented, the first makes use of the Lyapunov function to recover the gain matrices. …”
    Get full text
    Conference or Workshop Item
  17. 337

    Loss analysis of a mix-flow turbine with nozzled twin-entry volute at different admissions by Xue, Yingxian, Yang, Mingyang, Martinez-Botas, Ricardo F., Romagnoli, Alessandro, Deng, Kangyao

    Published 2020
    “…Loss breakdown of turbine shows that loss is higher in nozzle but lower in rotor when the majority of flow is fed from upper part of the component (near shroud). Opposite phenomenon happens when the majority is fed from lower part (near hub). …”
    Get full text
    Journal Article
  18. 338

    15.571 Generating Business Value from Information Technology, Spring 2007 by Weill, Peter

    Published 2010
    “…The familiar components of the place: cash, checks, paper reports and documents, store fronts, and face to face meetings remain important, but less so. …”
    Get full text
    Learning Object
  19. 339

    Thermal-mechanical design of sandwich SiC power module with micro-channel cooling by Yin, Shan, Tseng, King Jet, Zhao, Jiyun

    Published 2013
    “…Finite element analysis of thermal stress was further carried out to check that the CTE mismatch in the packaging has been minimized.…”
    Get full text
    Get full text
    Conference Paper
  20. 340

    Multi-objectives firefly algorithm for task offloading in the edge-fog-cloud computing by A. Saif, Faten, Latip, Rohaya, Mohd Hanapi, Zurina, Kamarudin, Shafinah, Senthil Kumar, A.V., Salem Bajaher, Awadh

    Published 2024
    “…Additionally, it verifies the status of the server (on/off) before offloading; if the server is unavailable, the algorithm proceeds to check the next layer. In the second stage, the strategy employs a Multi-objective Firefly (MFA) algorithm to assign the optimal computational device within the selected layer. …”
    Get full text
    Article