Showing 241 - 260 results of 309 for search '((ceers OR cers) OR (cheers OR (checked OR checks)))*', query time: 0.27s Refine Results
  1. 241

    Practical relay code design based on protograph codes by Noor-A-Rahim, Md., Ali, G.G.Md. Nawaz, Guan, Yong Liang

    Published 2018
    “…The low-density parity-check (LDPC) code design for three-terminal (namely, source, relay, and destination) relay network while considering decode-and-forward protocol is studied. …”
    Get full text
    Get full text
    Journal Article
  2. 242

    EV charging/discharging coordination in LV distribution grid by Toh, Wei Le.

    Published 2013
    “…The proposed algorithm should be tested using the Microgrid Energy Management System (MG-EMS) setup in LaCER laboratory. The effectiveness of the proposed algorithm should be assessed in terms of operating cost, cable power losses and voltage deviations of the distribution grid which is a 13-node test feeder. …”
    Get full text
    Final Year Project (FYP)
  3. 243

    Remote monitoring and control of wind turbine simulator (a1026-131) by Yin, Min Htet

    Published 2014
    “…In Laboratory for Clean Energy Research (LaCER), a wind turbine simulator is set up with a 7.5 kW induction generator operated as wind turbine generator; a 11 kW induction motor which acts as a wind turbine to convert the wind energy into the mechanical power. …”
    Get full text
    Final Year Project (FYP)
  4. 244

    Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications by Zyskind, Guy, Yanai, Avishay, Pentland, Alex

    Published 2024
    “…Using that deployment, we showcase the protocols' applicability for two interesting applications, policy checking and wallet exchange, as well as their efficiency by demonstrating low gas costs and fees.…”
    Get full text
    Article
  5. 245

    Transverse momentum-dependent heavy-quark fragmentation at next-to-leading order by von Kuk, Rebecca, Michel, Johannes K. L., Sun, Zhiquan

    Published 2024
    “…Our final results in position space agree with those of a recent calculation by another group that used a highly orthogonal organization of singularities in the intermediate momentum-space steps, providing a strong independent cross check. As an immediate application, we present the complete quark mass dependence of the energy-energy correlator (EEC) in the back-to-back limit at (𝛼𝑠).…”
    Get full text
    Article
  6. 246

    Disrupting Monocultural Tendencies through Multimodal Montage by Singha, Mrinalini

    Published 2024
    “…As an Indian artist, the author situates her own practice within this discourse, highlighting projects such as `The Whistleblower' (2023), a tangible archive within an everyday object, and `A Mystery for You' (2023-24), a fact-checking game that merges a tangible interface with a large language model (LLM). …”
    Get full text
    Get full text
    Thesis
  7. 247

    Social tags as news event detectors by Chua, Alton Yeow Kuan, Razikin, Khasfariyati, Goh, Dion Hoe-Lian

    Published 2013
    “…Relative frequencies of the top 200 most frequently-used tags were analysed to check for spikes and bursts. Based on the results, four main findings emerged. …”
    Get full text
    Get full text
    Journal Article
  8. 248

    Development of a mobile app for the thermal design of heat exchangers by Yap, Shi Kai

    Published 2021
    “…These include the fouling calculations and the flow-induced vibration check. The design of a STHE is extremely complicated and is a tedious process with many required calculations. …”
    Get full text
    Final Year Project (FYP)
  9. 249

    Crowd monitoring and detection by Li, Xin

    Published 2022
    “…However, it requires a lot of manpower to check the scanning pass and vaccination status which always lead to a long queue and make social distance hard to maintain. …”
    Get full text
    Final Year Project (FYP)
  10. 250

    A fuzzy rough number extended AHP and VIKOR for failure mode and effects analysis under uncertainty by Zhu, Guoniu, Ma, Jin, Hu, Jie

    Published 2022
    “…A practical case study of the check valve is provided to validate the applicability of the proposed FMEA. …”
    Get full text
    Journal Article
  11. 251

    Non-normal distribution of residual flexural strengths of steel fiber reinforced concretes and its impacts on design and conformity assessment by He, Shan, Yang, En-Hua

    Published 2022
    “…The logarithmic transformation provides a practical and convenient approach to design and to check the conformity of log-normally distributed SFRC properties adopting existing criteria. …”
    Get full text
    Journal Article
  12. 252

    CT sigma delta ADC for audio applications by Hnin, Hnin Soe.

    Published 2009
    “…The non-idealities simulation was extensively run to check how much the overall system can take non-idealities behaviors of gain, gain bandwidth, slew-rate and linearity while meeting performance requirements. …”
    Get full text
    Final Year Project (FYP)
  13. 253

    Towards explainable and semantically coherent claim extraction for an automated fact-checker by Yoswara, Jocelyn Valencia

    Published 2024
    “…Therefore, this project aims to enhance the claim extraction process of an automatic fact-checker, improve the accuracy of fact-checking, and mitigate the limitations associated with LLMs' reliance on outdated information. …”
    Get full text
    Final Year Project (FYP)
  14. 254

    An ultra low-power precision sample-and-hold circuit for biomedical application by Mah, Sai Lei

    Published 2010
    “…The parameters that were used to check the precision of the S/H circuit are hold pedestal and total harmonic distortion. …”
    Get full text
    Final Year Project (FYP)
  15. 255

    Online game for Chinese chess by Lee, Jia Woei.

    Published 2010
    “…Research from various sources such as internet, books and journals was done to enhance in understanding of the development of an online Chinese Chess game.The results had indicated that a simple move of a chess piece involves a lot of checking and consideration on the types of moves possible. …”
    Get full text
    Final Year Project (FYP)
  16. 256

    Three dimensional numerical manifold method and rock engineering applications by He, Lei

    Published 2011
    “…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
    Get full text
    Thesis
  17. 257

    Eye movement feature extraction for driver vigilance classification by Fu, Zhuxuan

    Published 2015
    “…Analysis of variance (ANOVA) test was employed to check if there exist significant differences among three stages within one driving period. …”
    Get full text
    Final Year Project (FYP)
  18. 258

    SCE17-0185: STIX representation of cyber threat intelligence by Phua, Kin Wee

    Published 2018
    “…To allow organizations to perform automated checking to determine whether the IT environment of the organization matches the profile of such cyber threat targets. …”
    Get full text
    Final Year Project (FYP)
  19. 259

    A signal through the noise: accurate determination of hydrogen atom positions in crystal structures and optimisation of Laue neutron diffraction methods by Sackman, GA

    Published 2021
    “…This focuses on:</p> <p>Recommendations for the efficient collection of Laue neutron data, in order to optimise the data set completeness and awarded beam-time; strategic considerations for how to best answer the scientific question(s) at hand in a Laue neutron experiment, whilst planning against future contingencies; improving methods for crystal packing and shipping, particularly for air and moisture sensitive materials; discussing issues arising from ice forming on the crystal during a Laue neutron diffraction experiment, and methods for minimising this problem; more effectively modelling disorder using ring shapes, in the crystallographic refinement package CRYSTALS; providing rationale for Laue neutron specific checkCIF comments.</p> <p>Alongside the aforementioned research projects, the relevant history and theory contextualising the crystallographic methods used is presented.…”
    Thesis
  20. 260

    A random-key genetic algorithm-based method for transportation network vulnerability envelope analysis under simultaneous multi-link disruptions by Gu, Y, Ryu, S, Xu, Y, Chen, A, Chan, H-Y, Xu, X

    Published 2024
    “…Specifically, the TNVE problem can be formulated as a binary integer bi-level program (BLP), in which the upper-level problem maximizes/minimizes the remaining network performance under a given number of disrupted links, and the lower-level problem adopts the shortest path problem to check the post-disruption connectivity of each origin–destination (O-D) pair while circumventing the cumbersome path enumeration or path set pre-generation. …”
    Journal article