Showing 421 - 438 results of 438 for search '((file OR full) OR call) ((finding OR findings))', query time: 0.17s Refine Results
  1. 421

    Proactive monitoring in process control using predictive trend displays by Yin, Shanqing

    Published 2012
    “…A series of literature reviews was conducted to find out more about the concepts related to the psychology of prediction, followed by various engineering elements, particularly in process control, that aid prediction. …”
    Get full text
    Thesis
  2. 422

    Efficient FPGA realization of inner-products of variable vectors by Yan, Yi

    Published 2014
    “…An Inner product is a generalization of the dot product (also called Scalar product). It is a method to multiply vectors together. …”
    Get full text
    Final Year Project (FYP)
  3. 423

    Pear person-centred care for dementia patients (front end Android app) by Ng, Jian Xiong

    Published 2018
    “…The absence of medical treatment for dementia till today, had sparks researchers around the globe to find a breakthrough in the treatment one day. …”
    Get full text
    Final Year Project (FYP)
  4. 424

    Agamben's understanding of time and its implications for Christology by Wright, O

    Published 2022
    “…This limited focus, what is sometimes called temporality, is not new to theology, or indeed philosophy. …”
    Thesis
  5. 425

    Oikeion, Agathon, and Archaia Phusis in Plato’s Symposium by Crüwell, HS

    Published 2024
    “…Rather, he unwittingly communicates central ethical and psychological ideas which we find developed in key passages of Plato’s dialogues. …”
    Journal article
  6. 426

    A Dirichlet-multinomial mixed model for determining differential abundance of mutational signatures by Morrill Gavarró, L, Couturier, D, Markowetz, F

    Published 2025
    “…Background: Mutational processes of diverse origin leave their imprints in the genome during tumour evolution. These imprints are called mutational signatures and they have been characterised for point mutations, structural variants and copy number changes. …”
    Journal article
  7. 427

    Extreme learning machine for classification and clustering on multiview data by Chen, Jichao

    Published 2021
    “…Many real-world applications deal with data that have multiple feature sets. Such data is called multiview data, where each feature set is considered as a view. …”
    Get full text
    Thesis-Doctor of Philosophy
  8. 428

    Constructing intrinsic delaunay triangulations from the dual of geodesic voronoi diagrams by Liu, Yong-Jin, Fan, Dian, Xu, Chun-Xu, He, Ying

    Published 2018
    “…We first compute a geodesic Voronoi diagram (GVD) by taking all mesh vertices as generators and then find its dual graph. The sufficient condition for the dual graph to be a proper triangulation is that all Voronoi cells satisfy the so-called closed ball property. …”
    Get full text
    Get full text
    Journal Article
  9. 429

    Absolute deviance method for symmetrical uniform designs by Lau, Grace Chui Ting

    Published 2015
    “…Furthermore, an optimization part is added to the cutting method to find an appropriate number for experimental runs of the initial design. …”
    Get full text
    Thesis
  10. 430

    Exploratory Survey on UUM Student’s Acceptance Towards the Founding of Waqf Institution For Education by Omar, Hydzulkifli Hashim, Abu Bakar, Azizi, Basary, Noor Faezah, Shuib, Mohd Sollehudin, Yusuff, Noraini

    Published 2018
    “…In cases where the above methods are deemed unsuitable, then the Nazir should try to find other alternatives to make the waqf land productive. …”
    Get full text
    Article
  11. 431

    A multi-view context-aware approach to Android malware detection and malicious code localization by Narayanan, Annamalai, Chandramohan, Mahinthan, Chen, Lihui, Liu, Yang

    Published 2020
    “…Subsequently, it employs Multiple Kernel Learning (MKL) to find a weighted combination of the views which yields the best detection accuracy. …”
    Get full text
    Journal Article
  12. 432

    Performance analysis of IEEE 802.11p safety message broadcast with and without relaying at road intersection by Md. Noor-A-Rahim, G. G. Md. Nawaz Ali, Nguyen, Hieu, Guan, Yong Liang

    Published 2018
    “…The analytical results are verified by the NS-3 simulation. From the results, we find that the overall delivery ratio is very poor when the broadcasting vehicle is not close enough to the intersection-center. …”
    Get full text
    Get full text
    Journal Article
  13. 433

    Referring expression segmentation: from conventional to generalized by Liu, Chang

    Published 2024
    “…Next, based on this work, we find that the generic attention mechanism used in the classic Transformer is designed for processing single-modal data. …”
    Get full text
    Thesis-Doctor of Philosophy
  14. 434

    An epigenetic analysis of planarian stem cells by Dattani, A

    Published 2018
    “…<p>Planarian flatworms possess somatic pluripotent stem cells, called neoblasts (NBs), which are able to differentiate into all cell types that constitute the adult body plan. …”
    Thesis
  15. 435

    A sociological analysis of Iranian popular music in the 21st century by Safideh, Mohammad Rezazadeh

    Published 2015
    “…The main purpose of this thesis is to give a sociological explanation on what is called “Iranian popular music in 21st century” covering a period from the year 2000 to 2014. …”
    Get full text
    Thesis
  16. 436

    Discrete geodesic graphs by Fang, Zheng

    Published 2019
    “…The discrete geodesic problem aims to find the shortest path and distance between arbitrary points on discrete surfaces. …”
    Get full text
    Get full text
    Thesis
  17. 437

    Localized structural and bulk effects in hybrid organic-inoraginc perovskites by Wong, Walter Pei De

    Published 2021
    “…Through a combination of steady state photoinduced absorption, transient absorption and transient photocurrent measurements, this chapter has confirmed the existence of theoretically predicted polaronic states in MAPbI3 which finds its origins in the ‘soft’ lead – iodide bond. …”
    Get full text
    Thesis-Doctor of Philosophy
  18. 438

    Enhancing network access for highly mobile nodes by Xia, Yang

    Published 2014
    “…With the proliferation of mobile devices, the demand for mobile computing has called for better mobile network access technology. …”
    Get full text
    Thesis