Search alternatives:
ceers » cheers (Expand Search), peers (Expand Search), cers (Expand Search)
beers » peers (Expand Search), bears (Expand Search), bees (Expand Search), beens (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
ceers » cheers (Expand Search), peers (Expand Search), cers (Expand Search)
beers » peers (Expand Search), bears (Expand Search), bees (Expand Search), beens (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
-
261
Minimal type inference for Linked Data consumers
Published 2015“…We also prove subject reduction and type safety results, which justify our claim that our language is statically type checked and does not throw basic runtime type errors. …”
Get full text
Get full text
Journal Article -
262
Blockchain for RegTech: streamlining know your customer (KYC) pipelines
Published 2022“…With Decentralised Finance being developed to replace traditional financial services and transactions of virtual land being conducted on the Metaverse, these ecosystems often involve large amounts of money and require regulatory compliance checks. This calls for a solution that can interoperate effectively with these emerging technologies. …”
Get full text
Final Year Project (FYP) -
263
Numerical simulation of oxygen delivery in presence of hemoglobin hydrogel based oxygen carriers
Published 2016“…Red blood cells have standard shelf life of only 42 days and unable to be checked and sterilized for infective agents like HIV. …”
Get full text
Final Year Project (FYP) -
264
Safety assessment of autonomous vehicles using simulations
Published 2018“…For different configurations of the afore-mentioned, the simulation data is analysed using MATLAB and checked whether or not it meets safety constraints. …”
Get full text
Thesis -
265
An intrinsic algorithm for parallel Poisson disk sampling on arbitrary surfaces
Published 2013“…Hence, multiple threads can process the candidates simultaneously and resolve conflicts by checking the given priority values. Our algorithm guarantees that the generated Poisson disks are uniformly and randomly distributed without bias. …”
Get full text
Get full text
Journal Article -
266
Perennial semantic data terms of use for decentralized web
Published 2024“…This constitutes a “perennial” DToU language, where the policy authoring only occurs once, and we can conduct ongoing automated checks across users, applications and activity cycles. …”
Conference item -
267
Ergativity in Tongan
Published 2000“…Following Chomsky (1993), I assume that a structural case is assigned by feature checking in a Spec-head configuration. I also assume that only one Agr can be active in intransitive constructions: Agrs in accusative languages and Agro in ergative languages (Bobaljik 1993). …”
Thesis -
268
Effect of Dactylaria higginsii on interference of Cyperus rotundus with L. esculentum
Published 1999“…At 106 conidia ml-1, D. higginsii reduced the interference from C. rotundus, controlled C. rotundus better, and increased L. esculentum yield compared to the weedy checks.…”
Article -
269
Mitigate the effect of distributed generators connected to distribution system.
Published 2022“…ETAP program is used for analyzing and checking the results obtained, where the operating time and TMS value of all relays in the system are calculated in case the distribution generators are not connected, and to ensure the quality of coordination by Etap software, then the distributive generators are connected, their effects are studied, and the relays are coordinated again by the two previous methods. …”
Get full text
Article -
270
Effective 5D BIM requirements for risk mitigation during pre-contract stage.
Published 2022“…Risk mitigation strategies are proposed to make a positive impact on the 5D BIM implementation, which consist of regular checks and balances, improve skills and knowledge through training and acquire suitable 5D BIM applications. …”
Get full text
Article -
271
Membrane compaction in forward osmosis process
Published 2021“…The TFC membranes were continuously tested in FO experiments for 24 h by using DI water as feed and NaCl solutions of different concentrations as draw solution, and their performances were checked again using fresh feed solutions. At the end of FO experiments, all TFC membranes experienced water flux and salt flux decline to different extents. …”
Get full text
Journal Article -
272
Floquet Codes without Parent Subsystem Codes
Published 2024“…However, unlike the honeycomb code, it possesses an explicit CSS structure and its gauge checks do not form a subsystem code. Nevertheless, we show that our dynamic protocol conserves logical information and possesses a threshold for error correction. …”
Get full text
Article -
273
-
274
Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications
Published 2024“…Using that deployment, we showcase the protocols' applicability for two interesting applications, policy checking and wallet exchange, as well as their efficiency by demonstrating low gas costs and fees.…”
Get full text
Article -
275
Disrupting Monocultural Tendencies through Multimodal Montage
Published 2024“…As an Indian artist, the author situates her own practice within this discourse, highlighting projects such as `The Whistleblower' (2023), a tangible archive within an everyday object, and `A Mystery for You' (2023-24), a fact-checking game that merges a tangible interface with a large language model (LLM). …”
Get full text
Get full text
Thesis -
276
Mobile application for optical character recognition (OCR) of digits
Published 2021“…To further improve the recognition accuracy, an API is created for sanity checks based on the domain knowledge adopted from clinicians. …”
Get full text
Final Year Project (FYP) -
277
Towards explainable and semantically coherent claim extraction for an automated fact-checker
Published 2024“…Therefore, this project aims to enhance the claim extraction process of an automatic fact-checker, improve the accuracy of fact-checking, and mitigate the limitations associated with LLMs' reliance on outdated information. …”
Get full text
Final Year Project (FYP) -
278
Online game for Chinese chess
Published 2010“…Research from various sources such as internet, books and journals was done to enhance in understanding of the development of an online Chinese Chess game.The results had indicated that a simple move of a chess piece involves a lot of checking and consideration on the types of moves possible. …”
Get full text
Final Year Project (FYP) -
279
Three dimensional numerical manifold method and rock engineering applications
Published 2011“…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
Get full text
Thesis -
280
SCE17-0185: STIX representation of cyber threat intelligence
Published 2018“…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
Get full text
Final Year Project (FYP)