Showing 141 - 160 results of 313 for search '((ceers OR cers) OR (cheers OR (checkers OR checks)))*', query time: 0.12s Refine Results
  1. 141

    HFP 303E - Asian Thought: Indian, Chinese, And Japanese June 2016 by PPIK, Pusat Pengajian Ilmu Kemanusiaan

    Published 2016
    “…Please check that this examination paper consists of FOUR pages of printed material before you begin the examination. …”
    Get full text
    Teaching Resource
  2. 142

    Development of software testing and analysis tools : Part A by Ng, Qing Xiang.

    Published 2009
    “…The patterns are: • Identical/Compliment-Decision Pattern • Mutually-Exclusive-Decision Pattern • Check-then-Do Pattern • Loop-by-Flag Pattern The scope of this project is to create a set of tools to facilitate detecting of such infeasible paths by detecting the conditions that fulfill the patterns mentioned above. …”
    Get full text
    Final Year Project (FYP)
  3. 143

    The application of microtremor survey method in investigating the geological formation of Singapore by Muhammad Azri Bin Omar.

    Published 2011
    “…A comparison between the results obtained from SPAC analysis as well as borehole information will also be shown to check for consistency.…”
    Get full text
    Final Year Project (FYP)
  4. 144

    Recommendation in location based social networks by Chen, Long.

    Published 2013
    “…Temporal information in check-ins which interconnects users and point-of-interests have significant value in LBSNs. …”
    Get full text
    Final Year Project (FYP)
  5. 145

    Design and development of a robot invigilator by Wu, Xiangran.

    Published 2013
    “…By applying this technology, the robot invigilator can do what a traditional invigilator need to do during an examination such like, timing for the duration, checking the attendance face-to-face. A backend exam registration system also has been developed to simulate the real case. …”
    Get full text
    Final Year Project (FYP)
  6. 146

    Target detection in stationary background by Liu, Lu.

    Published 2013
    “…The basic principle of target detection is to compare the current image with a reference image which is call the background image, from the comparison result to define whether there is a moving target in the image by checking the changing in the image, pixel by pixel. …”
    Get full text
    Final Year Project (FYP)
  7. 147

    Report on industrial attachment with Autodesk Asia Private Limited by Zhu, Chenyang

    Published 2015
    “…Few projects were undertaken during the internship at Autodesk including porting Memento to Mac OS X, add check video update functionality to Memento, Mesh Segmentation using OpenCL and design and implementation of Large Mesh Web Viewer. …”
    Get full text
    Final Year Project (FYP)
  8. 148

    Investigating growth and properties of perovskite single crystals by Tan, Kok Ho

    Published 2018
    “…X-ray diffraction was conducted to check the purity of methylammonium lead bromide perovskite crystals grown. …”
    Get full text
    Final Year Project (FYP)
  9. 149

    Symbolic verification and strategy synthesis for turn-based stochastic games by Kwiatkowska, M, Norman, G, Parker, D, Santos, G

    Published 2022
    “…Probabilistic model checking techniques for this class of models allow us to formally specify quantitative specifications of either collective or individual behaviour and then automatically synthesise strategies for the agents under which these specifications are guaranteed to be satisfied. …”
    Book section
  10. 150

    Blind recognition of LDPC code parameters over erroneous channel conditions by Ramabadran, Swaminathan, Madhukumar, A. S., Wang, Guohua, Ting, Shang Kee

    Published 2020
    “…In this study, blind estimation algorithms are proposed to identify code dimension and codeword length parameters of low-density parity-check (LDPC) codes at the receiver over noisy or erroneous channel conditions assuming a non-cooperative scenario. …”
    Get full text
    Journal Article
  11. 151

    Multi-objectives firefly algorithm for task offloading in the edge-fog-cloud computing by A. Saif, Faten, Latip, Rohaya, Mohd Hanapi, Zurina, Kamarudin, Shafinah, Senthil Kumar, A.V., Salem Bajaher, Awadh

    Published 2024
    “…Additionally, it verifies the status of the server (on/off) before offloading; if the server is unavailable, the algorithm proceeds to check the next layer. In the second stage, the strategy employs a Multi-objective Firefly (MFA) algorithm to assign the optimal computational device within the selected layer. …”
    Get full text
    Article
  12. 152

    HKB312E - Selected Texts from European and American Literature [Karya-Karya Terpilih daripada Kesusasteraan Eropah dan Amerika] June 2019 by PPIK, Pusat Pengajian Ilmu Kemanusiaan

    Published 2019
    “…Second Semester Examination 2018/2019 Academic Session June 2019 HKB312E -Selected Texts from European and American Literature [Karya-Karya Terpilih daripada Kesusasteraan Eropah dan Amerika] Duration : 3 hours [Masa : 3 jam] Please check that this examination paper consists of SIX (6) pages of printed material before you begin the examination. …”
    Get full text
    Teaching Resource
  13. 153

    SDR4ALL based radar demonstration (Part 1) by Hu, Xudong.

    Published 2011
    “…In this report, process of building and the test data of the system are provided, after checking by the experiment outside, future recommendation has also been proposed.…”
    Get full text
    Final Year Project (FYP)
  14. 154

    Preprocessing and authentication of 2D barcodes by Chen, Changsheng.

    Published 2013
    “…In this thesis, we investigate the detection step of a barcode by modeling its finder pattern as a 2D signal with finite rate of innovations and reconstructing it through block by block operation. Then, a quality checking step of the barcode images is added to reject those poor quality images for saving the time in processing the undecodable images and avoiding wrongly decoded information. …”
    Get full text
    Thesis
  15. 155

    A study of periodic behaviors by Doan Manh, Hiep

    Published 2014
    “…It is our belief that the model is directly applicable in mining periodic behaviors for moving users of telecommunication companies with their GPS data or moving users of location-based social networks with their check-in data.…”
    Get full text
    Final Year Project (FYP)
  16. 156

    Finite element analysis on post-buckling of thin-walled structures using ANSYS by Theint, Yi Mon

    Published 2015
    “…The results obtained were checked against experimental data and led to the development and the revision of design procedures for the pin-ended lipped column and hollow box section.…”
    Get full text
    Final Year Project (FYP)
  17. 157

    A study to minimize 'A'-pillar blind spot in cars by Choo, Daryl Gavin Jun Yan

    Published 2018
    “…The solution proposals seek to help drivers check the blind spot passively without requiring them to look around the A-pillar. …”
    Get full text
    Final Year Project (FYP)
  18. 158

    Preparation and characterisation of smart polymer gels for wearable electronics by Shen, Clarence Xuanyi

    Published 2018
    “…The dielectric layer that was fabricated with a catechol-group polymer and Ionic Liquid, had shown healing capabilities when placed under conditions at 100°C for 10 minutes. Furthermore, a check on the capacitance value had shown that these dielectric layers functioned at above 1μF/𝑐𝑚2 at 20Hz, which are high capacitance values. …”
    Get full text
    Final Year Project (FYP)
  19. 159

    Condition monitoring of a train door system by Tan, Alvin Chong Wei

    Published 2019
    “…This project aims to strengthen the current condition monitoring system capabilities and enhance the reliability of Singapore Train System allows engineers to save time on checking every door for the possibilities of failure.…”
    Get full text
    Final Year Project (FYP)
  20. 160

    Automatic retrieval of visual continuity errors in movies by Pickup, L, Zisserman, A

    Published 2009
    “…<p>Continuity errors occur in many movies and television series, in spite of careful checking by those employed to minimise them. In this work we develop a scheme for automatically detecting these errors and producing a ranked list of the most likely inconsistencies, working from a commercial DVD release. …”
    Conference item