Search alternatives:
cers » ceres (Expand Search), cerys (Expand Search), cars (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
cheers » cheaters (Expand Search), chees (Expand Search), chers (Expand Search), cheens (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), hackers (Expand Search)
checks » check (Expand Search)
cheer » chee (Expand Search), cher (Expand Search), cheen (Expand Search)
sheer » shear (Expand Search), sheet (Expand Search), steer (Expand Search)
cers » ceres (Expand Search), cerys (Expand Search), cars (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
cheers » cheaters (Expand Search), chees (Expand Search), chers (Expand Search), cheens (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), hackers (Expand Search)
checks » check (Expand Search)
cheer » chee (Expand Search), cher (Expand Search), cheen (Expand Search)
sheer » shear (Expand Search), sheet (Expand Search), steer (Expand Search)
-
61
Effective 5D BIM requirements for risk mitigation during pre-contract stage.
Published 2022“…Risk mitigation strategies are proposed to make a positive impact on the 5D BIM implementation, which consist of regular checks and balances, improve skills and knowledge through training and acquire suitable 5D BIM applications. …”
Get full text
Article -
62
Floquet Codes without Parent Subsystem Codes
Published 2024“…However, unlike the honeycomb code, it possesses an explicit CSS structure and its gauge checks do not form a subsystem code. Nevertheless, we show that our dynamic protocol conserves logical information and possesses a threshold for error correction. …”
Get full text
Article -
63
-
64
Mobile application for optical character recognition (OCR) of digits
Published 2021“…To further improve the recognition accuracy, an API is created for sanity checks based on the domain knowledge adopted from clinicians. …”
Get full text
Final Year Project (FYP) -
65
-
66
Center potential
Published 2023“…To ensure the safety and trustworthiness of tutors, this application incorporates a rigorous verification process, which includes background checks, identity verification, and qualification validation. …”
Get full text
Final Year Project (FYP) -
67
Application development on an Android smart-phone
Published 2012“…The application intercepts all incoming messages and checks them for a certain password which uniquely identifies the owner. …”
Get full text
Final Year Project (FYP) -
68
Evaluation and fabrication of damaged composite material using non-destructive testing
Published 2019“…Since composites are extensively employed in many areas, it is important to determine the existence of surface and sub-surface defects before production and during regular maintenance checks. As time goes on, wear and tear occur to a material. …”
Get full text
Final Year Project (FYP) -
69
Experiences, perceptions and ethical considerations of the malaria infection study in Thailand
Published 2025“…We found that although compensation was a motivation for participation, this was secondary to it being beneficial to self (health checks; link to health networks; building merit) and others (medical research contribution; altruism). …”
Journal article -
70
Three essays on frictions of trade
Published 2018“…The analysis is based on an adapted gravity model with several alternative specifications for robustness checks. The result suggests that improvements on the road network lead to trade expansion on both intensive and extensive margins, but the effects vary across the regions. …”
Thesis -
71
Mediation effects of language anxiety and prior learning experience on academic speaking challenges and strategies among Libyan students in Malaysian universities
Published 2023“…Field notes and member checks were used for validation. Correlational procedures, structural equation modeling (SEM), and bootstrapping resampling analyses were conducted to examine the relationships between variables, validate study models, and test research hypotheses. …”
Get full text
Article -
72
kboolnet: a toolkit for the verification, validation, and visualization of reaction-contingency (rxncon) models
Published 2023“…The verification script VerifyModel.R checks for responsiveness to repeated stimulations as well as consistency of steady state behavior. …”
Get full text
Article -
73
15.571 Generating Business Value from Information Technology, Spring 2007
Published 2010“…The familiar components of the place: cash, checks, paper reports and documents, store fronts, and face to face meetings remain important, but less so. …”
Get full text
Learning Object -
74
Cooperative collision avoidance in multirobot systems using fuzzy rules and velocity obstacles
Published 2023“…In detail, at any time instant, a robot checks the robots that it may collide with and retrieves the most dangerous robot in each sector based on the predicted collision time; then, the robot generates its velocity in real-time via fuzzy inference and VO-based fine-tuning. …”
Get full text
Journal Article -
75
Our weapons, our problem: arms exports, democracy and civil society in Brazil and the UK
Published 2019“…The causal mechanism is in part explained by activities conducted by norm entrepreneurs, whose emergence is facilitated by the existence of institutions commonly found in democratic countries, especially a system of checks and balances, contested elections, and political and civil liberties. …”
Thesis -
76
A comparative analysis of ENCODE and Cistrome in the context of TF binding signal
Published 2024“…Moreover, the output format of the processing (BED narrowPeak) exposes a feature, the signalValue, which is seldom used in consistency checks, but can offer valuable insight on the quality of the data. …”
Get full text
Journal Article -
77
Essays on development economics
Published 2020“…The estimation results remain robust when subjected to further checks and sensitivity tests. In addition, we consider alternative channels including pathogen stress, historical population density and colonization, which may also influence the degree of institutionalized democracy via the cultural dimension of collectivism / individualism. …”
Get full text
Thesis-Doctor of Philosophy -
78
Physical unclonable function based solutions to unification of user, device and data authentication
Published 2020“…The non-repudiation assumption of these conventional techniques is being challenged by emerging artificial-intelligent assisted and malware-based attacks on independently chained weak links (factors), and their limited extension to IoT scenarios, where the sheer number of inexpensive and often insufficiently protected endpoints prevent application of standard, secret-key based techniques. …”
Get full text
Thesis-Doctor of Philosophy -
79
Synthesis and testing of asynchronous circuits - micropipeline
Published 2008“…The checker is designed to meet the Totally Self-Checking (TSC) goal based on the existing checker design concepts.…”
Get full text
Thesis -
80
Solving nondeterministic polynomial complete problems optically and the design of its light source
Published 2013“…Compare with the conventional computer calculation method, the problem solving time is reduced. This result is cheerful since all the NP-complete problems are inter convertible. …”
Get full text
Final Year Project (FYP)