Showing 181 - 200 results of 16,608 for search '((cheaters OR (sars OR (code OR pore))) OR (peers OR years))*', query time: 0.18s Refine Results
  1. 181
  2. 182

    Infection risk of SARS-CoV-2 in a dining setting : deposited droplets and aerosols by Ding, Shirun, Lee, Jia Shing, Mohamed Arif Mohamed, Ng, Bing Feng

    Published 2022
    “…Considering that safe-distancing and mask-wearing measures are not strictly enforced in dining settings in the context of SARS-CoV-2, the infection risks of patrons in a dining outlet (e.g., a cafe) is assessed in this study. …”
    Get full text
    Journal Article
  3. 183

    B cell receptor repertoire kinetics after SARS-CoV-2 infection and vaccination by Kotagiri, P, Mescia, F, Rae, WM, Bergamaschi, L, Tuong, ZK, Turner, L, Hunter, K, Gerber, PP, Hosmillo, M, Hess, C, Clatworthy, MR, Goodfellow, IG, Matheson, NJ, McKinney, EF, Wills, MR, Gupta, RK, Bradley, JR, Bashford-Rogers, RJM, Lyons, PA, Smith, KGC

    Published 2022
    “…We analyze serial samples from 171 SARS-CoV-2-infected individuals and 63 vaccine recipients and find the global BCR repertoire differs between them. …”
    Journal article
  4. 184

    QR code security authentication attendance system (part I) by Chew, Amanda Li Xin

    Published 2023
    “…With the advancement in technology, QR code seem to be an efficient solution for attendance taking. …”
    Get full text
    Final Year Project (FYP)
  5. 185

    Blind detection of interlever parameters for block and convolutional coded sequences by Liu, Xuezhe.

    Published 2012
    “…Blind detection of the interleaver period and the code rate becomes crucial.…”
    Get full text
    Final Year Project (FYP)
  6. 186

    Code auto-completion by intelligent auto-copy-paste-modify by Arief Setiawan

    Published 2014
    “…Developers often find a code snippet online and implement it in their own program. …”
    Get full text
    Final Year Project (FYP)
  7. 187

    Lattice Encoding of Cyclic Codes from Skew-polynomial Rings by Ducoat, Jérôme, Oggier, Frédérique

    Published 2015
    “…We propose a construction of lattices from cyclic codes from skew-polynomial rings. This construction may be seen as a variation of Construction A of lattices from linear codes, obtained from quotients of orders in cyclic division algebras. …”
    Get full text
    Get full text
    Conference Paper
  8. 188

    Secure code execution on cloud-based infrastructure with application containers by Chen, Fun Tat

    Published 2017
    “…Working with source code wrote by others is always a challenging task. …”
    Get full text
    Final Year Project (FYP)
  9. 189

    On the algebraic structure of quasi-cyclic codes IV : repeated roots by Ling, San, Niederreiter, Harald, Sole, Patrick

    Published 2013
    “…A trace formula for quasi-cyclic codes over rings of characteristic not coprime with the co-index is derived. …”
    Get full text
    Get full text
    Journal Article
  10. 190

    Automatic recognition of type of FEC codes in a robust environment by Khng, Qian Yu

    Published 2016
    “…In practice, accurate information about the type of FEC codes and code parameters used for encoding must be known at the receiver end. …”
    Get full text
    Final Year Project (FYP)
  11. 191

    Algorithm design and code optimization to speed-up bioinformatics software by Ritika Jain.

    Published 2012
    “…The results were tested against the previous code to ensure the validity of results obtained and compute the speed-up achieved. …”
    Get full text
    Final Year Project (FYP)
  12. 192
  13. 193

    Encoding and decoding of serially concatenated codes for data storage systems by Yin, Ke.

    Published 2013
    “…In this project, we consider the application of serially concatenated codes (SCC) for data storage systems. The SCC typically consists of an outer code and an inner code. …”
    Get full text
    Final Year Project (FYP)
  14. 194

    The black hole interior from non-isometric codes and complexity by Akers, Chris, Engelhardt, Netta, Harlow, Daniel, Penington, Geoff, Vardhan, Shreya

    Published 2024
    “…In this paper we explain how quantum error correction nonetheless can be used to explain the emergence of the black hole interior, via the idea of “non-isometric codes protected by computational complexity”. We show that many previous ideas, such as the existence of a large number of “null states”, a breakdown of effective field theory for operations of exponential complexity, the quantum extremal surface calculation of the Page curve, post-selection, “state-dependent/state-specific” operator reconstruction, and the “simple entropy” approach to complexity coarse-graining, all fit naturally into this framework, and we illustrate all of these phenomena simultaneously in a soluble model.…”
    Get full text
    Article
  15. 195
  16. 196
  17. 197

    An achievable region for double-unicast networks with linear network coding by Zeng, Yong, Ho, Tracey, Guan, Yong Liang, Xu, Xiaoli

    Published 2014
    “…In this paper, we present an achievable rate region for double-unicast networks by assuming that the intermediate nodes perform random linear network coding, and the source and sink nodes optimize their strategies to maximize the achievable region. …”
    Get full text
    Get full text
    Journal Article
  18. 198

    Automated coding of implicit motives : a machine-learning approach by Pang, Joyce S., Ring, Hiram

    Published 2022
    “…Results suggest that this is a promising direction to pursue in developing an automatic procedure for coding implicit motives.…”
    Get full text
    Journal Article
  19. 199

    Robust incentive mechanisms for efficient and secure coded edge intelligence by Ng, Jer Shyuan

    Published 2023
    “…To mitigate the challenges of distributed computing, coded distributed computing (CDC), i.e., a combination of coding theoretic techniques and distributed computing, has been proposed. …”
    Get full text
    Thesis-Doctor of Philosophy
  20. 200