Search alternatives:
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
code » mode (Expand Search), core (Expand Search)
pore » more (Expand Search)
peers » peer (Expand Search)
years » year (Expand Search)
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
code » mode (Expand Search), core (Expand Search)
pore » more (Expand Search)
peers » peer (Expand Search)
years » year (Expand Search)
-
221
Role of spatial and sociodemographic variation on SARS-CoV-2 transmission and public health interventions in England
Published 2024“…<p>This thesis investigates the dynamics of SARS-CoV-2 transmission in England from October 2020 to March 2022, focusing on how mobility patterns, sociodemographic factors, and public health interventions influenced the spread of the virus. …”
Thesis -
222
-
223
-
224
Three year performance of international provenance trials of Acacia auriculiformis
Published 1994“…The performance of 25 provenances in international trials on seven sites in four countries was assessed for survival and growth at 3 years. Of these provenances, seven were from Queensland, 12 from Northern Territory, Australia, and six from Papua New Guinea. …”
Get full text
Article -
225
Report to the President for year ended June 30, 2022, Anthropology
Published 2025“…This report contains the following sections: Personnel and Administrative Changes; Highlights of the Year; Teaching and Curriculum; Publications; Presentations; Contributions to MIT and Outside Communities…”
Get full text
-
226
-
227
Improving year-round protection against influenza infection in the tropics
Published 2022“…Vaccination is the main pharmacological method available to reduce transmission and prevent infection, but evidence that vaccine induced protection with the standard dose inactivated influenza vaccine lasts year-round is lacking. This thesis presents a review of influenza epidemiology in Asia and the association between the pattern of seasonality and latitude and climate; a systematic review and meta-analysis of test-negative design (TND) case-control studies in order to generate summary estimates of changes in vaccine effectiveness with time since vaccination; results of a cohort study that investigates whether there is evidence for waning vaccine protection against severe influenza in Singapore; an observer-blind randomised clinical trial of annual versus biannual influenza vaccination in older adults, and further analysis of predictors of waning antibody titres post-vaccination.…”
Get full text
Thesis-Doctor of Philosophy -
228
Timor-Leste’s Challenges : Year After the May 2018 Elections
Published 2019“…A year after the last parliamentary elections, in which the Alliance for Change (AMP) coalition won a clear majority, the 2018 and 2019 budgets have been passed, ending a period of considerable uncertainty and gridlock. …”
Get full text
Get full text
Commentary -
229
Real-time positioning implementation via GPS code phase mesurements
Published 2008“…GPS receivers are gradually overcoming cost boundaries: handhold GPS receivers are now available for less than $100 (US dollars) and millions are sold every year. Intense competition is the motivation for GPS companies to create killer feature, they are striving to include more and more innovations and improvements in their products.…”
Get full text
Thesis -
230
QR-code based real-time interactive learning in iOS
Published 2019“…The final year project titled “QR-Code Based Real-Time Interactive Learning in iOS” aims to develop a mobile application for Apple iOS Devices (iPhone, iPad) to enhance the learning methods, in-class participation, engagement and interaction between the lecturer and the students. …”
Get full text
Final Year Project (FYP) -
231
On the design of capacity-approaching error-correction codes for multi constrained systems
Published 2021Get full text
Final Year Project (FYP) -
232
Cyclic codes over GR(p2,m) of length pk
Published 2013“…We study cyclic codes of length pk over GR(p2,m), or equivalently, ideals of the ring GR(p2,m)/ upk − 1 . …”
Get full text
Get full text
Journal Article -
233
-
234
Opening the AI Black Box: Distilling Machine-Learned Algorithms into Code
Published 2025“…Can we turn AI black boxes into code? Although this mission sounds extremely challenging, we show that it is not entirely impossible by presenting a proof-of-concept method, MIPS, that can synthesize programs based on the automated mechanistic interpretability of neural networks trained to perform the desired task, auto-distilling the learned algorithm into Python code. …”
Get full text
Article -
235
Hand gesture recognition, prediction, and coding using hidden Markov models
Published 2007Get full text
Thesis -
236
Efficient decoding of permutation codes obtained from distance preserving maps
Published 2013“…We study the decoding of permutation codes obtained from distance preserving maps and distance increasing maps from Hamming space. …”
Get full text
Get full text
Conference Paper -
237
Discriminative feature extraction for speech recognition using continuous output codes
Published 2013“…In this paper, we propose a novel method to obtain discriminative feature transformation based on output coding technique for speech recognition. The output coding transformation projects the speech features from their original space to a new one where each dimension of the features captures information to distinguish different phones. …”
Get full text
Get full text
Journal Article -
238
Reversible natural language watermarking using synonym substitution and arithmetic coding
Published 2019Subjects: “…Arithmetic Coding…”
Get full text
Get full text
Get full text
Journal Article -
239
Blind recognition of LDPC code parameters over erroneous channel conditions
Published 2020“…Blind reconstruction of channel coding parameters plays a significant role in non-cooperative military and spectrum surveillance applications. …”
Get full text
Journal Article -
240
Coded federated learning for communication-efficient edge computing: a survey
Published 2024“…This survey explores the application of coding techniques in DML and coded edge computing in the distributed system to enhance system speed, robustness, privacy, and more. …”
Get full text
Journal Article