Showing 161 - 180 results of 339 for search '((ceers OR beers) OR ((cheers OR cheaters) OR (crackers OR (checker OR checked))))', query time: 0.16s Refine Results
  1. 161

    Petri net-based efficient determination of optimal schedules for transport-dominant single-arm multi-cluster tools by Yang, Fajun, Wu, Naiqi, Qiao, Yan, Zhou, Mengchu, Su, Rong., Qu, Ting

    Published 2018
    “…Thereafter, an efficient algorithm is developed to check the given conditions and find such a schedule efficiently if existing. …”
    Get full text
    Get full text
    Journal Article
  2. 162

    Tournaments of financial analysts by Yin, Huifang, Zhang, Huai

    Published 2013
    “…This finding survives several robustness checks and is more pronounced when the interim assessment date is closer to the end of the tournament period, when analysts are inexperienced, and when the market activity is high. …”
    Get full text
    Get full text
    Journal Article
  3. 163

    HFP 303E - Asian Thought: Indian, Chinese, And Japanese June 2016 by PPIK, Pusat Pengajian Ilmu Kemanusiaan

    Published 2016
    “…Please check that this examination paper consists of FOUR pages of printed material before you begin the examination. …”
    Get full text
    Teaching Resource
  4. 164

    Development of software testing and analysis tools : Part A by Ng, Qing Xiang.

    Published 2009
    “…The patterns are: • Identical/Compliment-Decision Pattern • Mutually-Exclusive-Decision Pattern • Check-then-Do Pattern • Loop-by-Flag Pattern The scope of this project is to create a set of tools to facilitate detecting of such infeasible paths by detecting the conditions that fulfill the patterns mentioned above. …”
    Get full text
    Final Year Project (FYP)
  5. 165

    The application of microtremor survey method in investigating the geological formation of Singapore by Muhammad Azri Bin Omar.

    Published 2011
    “…A comparison between the results obtained from SPAC analysis as well as borehole information will also be shown to check for consistency.…”
    Get full text
    Final Year Project (FYP)
  6. 166

    Recommendation in location based social networks by Chen, Long.

    Published 2013
    “…Temporal information in check-ins which interconnects users and point-of-interests have significant value in LBSNs. …”
    Get full text
    Final Year Project (FYP)
  7. 167

    Design and development of a robot invigilator by Wu, Xiangran.

    Published 2013
    “…By applying this technology, the robot invigilator can do what a traditional invigilator need to do during an examination such like, timing for the duration, checking the attendance face-to-face. A backend exam registration system also has been developed to simulate the real case. …”
    Get full text
    Final Year Project (FYP)
  8. 168

    Target detection in stationary background by Liu, Lu.

    Published 2013
    “…The basic principle of target detection is to compare the current image with a reference image which is call the background image, from the comparison result to define whether there is a moving target in the image by checking the changing in the image, pixel by pixel. …”
    Get full text
    Final Year Project (FYP)
  9. 169

    Report on industrial attachment with Autodesk Asia Private Limited by Zhu, Chenyang

    Published 2015
    “…Few projects were undertaken during the internship at Autodesk including porting Memento to Mac OS X, add check video update functionality to Memento, Mesh Segmentation using OpenCL and design and implementation of Large Mesh Web Viewer. …”
    Get full text
    Final Year Project (FYP)
  10. 170

    Investigating growth and properties of perovskite single crystals by Tan, Kok Ho

    Published 2018
    “…X-ray diffraction was conducted to check the purity of methylammonium lead bromide perovskite crystals grown. …”
    Get full text
    Final Year Project (FYP)
  11. 171

    Influence of non-linear wave load models on monopile supported offshore wind turbines for extreme conditions by Ryan, GV, Tang, T, McAdam, RA, Adcock, TAA

    Published 2025
    “…These models are compared to the widely used constrained wave approach, showing that significant differences are predicted for steel and geotechnical design checks. This suggests that the industry standard approach may be inappropriate for the design of monopile structures against extreme wave loads.…”
    Journal article
  12. 172

    Symbolic verification and strategy synthesis for turn-based stochastic games by Kwiatkowska, M, Norman, G, Parker, D, Santos, G

    Published 2022
    “…Probabilistic model checking techniques for this class of models allow us to formally specify quantitative specifications of either collective or individual behaviour and then automatically synthesise strategies for the agents under which these specifications are guaranteed to be satisfied. …”
    Book section
  13. 173

    Active Learning for Inference and Regeneration of Applications that Access Databases by Shen, Jiasi, Rinard, Martin

    Published 2025
    “…Konure also implements a regenerator that produces a translated Python implementation of the application that systematically includes relevant security and error checks.…”
    Get full text
    Article
  14. 174

    Blind recognition of LDPC code parameters over erroneous channel conditions by Ramabadran, Swaminathan, Madhukumar, A. S., Wang, Guohua, Ting, Shang Kee

    Published 2020
    “…In this study, blind estimation algorithms are proposed to identify code dimension and codeword length parameters of low-density parity-check (LDPC) codes at the receiver over noisy or erroneous channel conditions assuming a non-cooperative scenario. …”
    Get full text
    Journal Article
  15. 175

    Developing of innovative and cool mobile applications on the Googles Android powered devices 5 by Arun Mohan

    Published 2014
    “…Sports Info is tailored to meet the expectations of smart phone users who regularly checks sports updates like match schedules, score card and important sports news.…”
    Get full text
    Final Year Project (FYP)
  16. 176

    Multi-objectives firefly algorithm for task offloading in the edge-fog-cloud computing by A. Saif, Faten, Latip, Rohaya, Mohd Hanapi, Zurina, Kamarudin, Shafinah, Senthil Kumar, A.V., Salem Bajaher, Awadh

    Published 2024
    “…Additionally, it verifies the status of the server (on/off) before offloading; if the server is unavailable, the algorithm proceeds to check the next layer. In the second stage, the strategy employs a Multi-objective Firefly (MFA) algorithm to assign the optimal computational device within the selected layer. …”
    Get full text
    Article
  17. 177

    HKB312E - Selected Texts from European and American Literature [Karya-Karya Terpilih daripada Kesusasteraan Eropah dan Amerika] June 2019 by PPIK, Pusat Pengajian Ilmu Kemanusiaan

    Published 2019
    “…Second Semester Examination 2018/2019 Academic Session June 2019 HKB312E -Selected Texts from European and American Literature [Karya-Karya Terpilih daripada Kesusasteraan Eropah dan Amerika] Duration : 3 hours [Masa : 3 jam] Please check that this examination paper consists of SIX (6) pages of printed material before you begin the examination. …”
    Get full text
    Teaching Resource
  18. 178

    SDR4ALL based radar demonstration (Part 1) by Hu, Xudong.

    Published 2011
    “…In this report, process of building and the test data of the system are provided, after checking by the experiment outside, future recommendation has also been proposed.…”
    Get full text
    Final Year Project (FYP)
  19. 179

    Preprocessing and authentication of 2D barcodes by Chen, Changsheng.

    Published 2013
    “…In this thesis, we investigate the detection step of a barcode by modeling its finder pattern as a 2D signal with finite rate of innovations and reconstructing it through block by block operation. Then, a quality checking step of the barcode images is added to reject those poor quality images for saving the time in processing the undecodable images and avoiding wrongly decoded information. …”
    Get full text
    Thesis
  20. 180

    A study of periodic behaviors by Doan Manh, Hiep

    Published 2014
    “…It is our belief that the model is directly applicable in mining periodic behaviors for moving users of telecommunication companies with their GPS data or moving users of location-based social networks with their check-in data.…”
    Get full text
    Final Year Project (FYP)