Showing 41 - 60 results of 90 for search '((hone OR horn) OR horse)'s', query time: 0.08s Refine Results
  1. 41

    Design of a conformal end-fire array antenna by Wang, Xin Xin

    Published 2015
    “…This project aims how to combine SIW with horn antenna concept to design wideband and low-profile conformal antenna. …”
    Get full text
    Final Year Project (FYP)
  2. 42

    On the investigation of ash deposition effect on flow-induced vibration energy harvesting by Wang, Junlei, Gu, Shanghao, Yurchenko, Daniil, Hu, Guobiao, Wei, Ronghan

    Published 2022
    “…The CFD analysis results indicate that the appearance of the small-scale secondary vortices (SV) widens the wake flow and increases the aerodynamic force produced by the horn-like bluff body. The flow-induced vibration of the harvester using the horn-like bluff body transforms from VIV to galloping. …”
    Get full text
    Journal Article
  3. 43

    On the prime values represented by polynomials by Foo, Timothy

    Published 2013
    “…The most general thus far is the Bateman-Horn conjecture. While the Bateman-Horn conjecture remains open, “on average” results have been given by Baier and Zhao [BZ2], [BZ4] for quadratic polynomials. …”
    Get full text
    Thesis
  4. 44

    SUPERHERO OF LOVE : HEAL YOUR BROKEN HEART & THEN GO SAVE THE WORLD / by Fonger, Bridget, 1962-, author 655765

    Published 2019
    “…Readers will develop and hone their powers of Super Sight, Super Hearing, Super Humility, Super Self-Love, and Super Alignment to build their connection to their own hearts, the ultimate source of love in their lives…”
    text
  5. 45
  6. 46

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. …”
    Get full text
    Get full text
    software, multimedia
  7. 47

    Design of broadband double-ridged antenna by Lo, Wei Chen.

    Published 2009
    “…The purpose of this report is to introduce the design of a broadband double-ridged horn antenna of the operating frequency range of 0.8~26GHz. …”
    Get full text
    Final Year Project (FYP)
  8. 48

    Low-profile and end-fire antennas for airborne applications by Chen, Zhuozhu

    Published 2017
    “…An ellipse-shaped copper taper is extended along the horn aperture in order to obtain a smooth transition from horn aperture to free space. …”
    Get full text
    Thesis
  9. 49

    Tabula rasa: model transfer for object category detection by Aytar, Y, Zisserman, A

    Published 2012
    “…Experiments (on PASCAL VOC) demonstrate significant performance gains by transfer learning from one class to another (e.g. motorbike to bicycle), including one-shot learning, specialization from class to a subordinate class (e.g. from quadruped to horse) and transfer using multiple components. In the case of multiple training samples it is shown that a detection performance approaching that of the state of the art can be achieved with substantially fewer training samples.…”
    Conference item
  10. 50

    Thin 3-D bandpass frequency-selective structure based on folded substrate for conformal radome applications by Omar, Ahmed Abdelmottaleb, Shen, Zhongxiang

    Published 2021
    “…A fabricated prototype of this radome is measured in the presence of a broadband horn antenna.…”
    Get full text
    Journal Article
  11. 51

    Starting from scratch by Koh, Bernice Jia Hong, Goh Shun Jie, Tan, Benjamin, Tan, Joanne Li Ling

    Published 2016
    “…Based on research findings, the problem statement was identified, which helped hone the campaign’s strategy, tactics and goals. …”
    Get full text
    Final Year Project (FYP)
  12. 52

    Bacterial type VI secretion system helps prevent cheating in microbial communities by Filloux, Alain

    Published 2024
    “…In their paper, “Trojan horse-like T6SS effector TepC mediates both interference competition and exploitative competition”, Song and colleagues (2024) remind us of an important societal principle that everyone contributes to benefit the collective population [1]. …”
    Get full text
    Journal Article
  13. 53

    Contemporary Somali piracy : evaluating the effectiveness of counter-piracy measures by Leong, Kuan Yee.

    Published 2011
    “…Despite the unprecedented efforts seen in countering Somali piracy in the waters off the Horn of Africa, piracy continues to be the major threat for vessels sailing through that region. …”
    Get full text
    Final Year Project (FYP)
  14. 54

    15.280 Communication for Managers, Fall 2008 by Hartman, Neal

    Published 2017
    “…Students may also enroll in 15.277 Special Seminar in Communication: Leadership and Personal Effectiveness Coaching. 15.280 is offered for 6 units and 15.277 provides an additional 3 units for a total of 9 units in Managerial Communication. 15.277 acts as a lab component to 15.280 and provides students additional opportunities to hone their communication skills through a variety of in-class exercises.…”
    Get full text
    Learning Object
  15. 55

    A multi-layer CNN-GRUSKIP model based on transformer for spatial: temporal traffic flow prediction by Mohammad Ata, Karimeh Ibrahim, Hassan, Mohd Khair, Ismaeel, Ayad Ghany, Al-Haddad, Syed Abdul Rahman, Alquthami, Thamer‎, Alani, Sameer

    Published 2024
    “…The model comprises (1) the specialized CNN feature extraction, (2) the GRU-SKIP enhanced long-temporal module adept at capturing extended patterns, (3) a transformer module employing encoder-decoder and multi-attention mechanisms to hone prediction accuracy and trim model complexity, and (4) a bespoke prediction module. …”
    Get full text
    Article
  16. 56

    Effect of turbine motion on floating off shore wind turbine aerodynamics by Tignol, Bo Junior

    Published 2024
    “…Finally, future work should also further hone in on the inclusion of LES at different freestream wind and surge and pitch combinations to explore the potential formation of complex wake states, as well as the investigation of in-sync and out-of-sync joint pitch-and-surge cases to explore the occurrence of any nonlinear aerodynamic interactions.…”
    Get full text
    Thesis
  17. 57

    Envisioning Water: Sustainability and Future-Making in Dubai and Los Angeles by Christidi, Nadia

    Published 2024
    “…Treating sustainability as a “boundary object” that is shared but viewed differently by actors enables me to hone in on the interests and forces - sometimes countervailing - that shape sustainability projects. …”
    Get full text
    Thesis
  18. 58

    Development of millimetre-wave heterodyne array for airborne and space satellite mission by Tan, B, Wenninger, J, Yassin, G

    Published 2022
    “…We will describe the design of a novel easy-to-machine feed horn technology which enables deployment of large arrays with minimal cost. …”
    Conference item
  19. 59

    Annotated bacterial chromosomes from frame-shift-corrected long-read metagenomic data by Arumugam, Krithika, Bağcı, Caner, Bessarab, Irina, Beier, Sina, Buchfink, Benjamin, Górska, Anna, Qiu, Guanglei, Huson, Daniel H., Williams, Rohan B. H.

    Published 2019
    “…Background : Short-read sequencing technologies have long been the work-horse of microbiome analysis. Continuing technological advances are making the application of long-read sequencing to metagenomic samples increasingly feasible. …”
    Get full text
    Get full text
    Journal Article
  20. 60

    A pilot study on peptidylarginine deiminases and protein deimination in animal cancers across vertebrate species by Inal, Jameel, Hristova, Mariya, Lange, Sigrun

    Published 2022
    “…Cancers were selected from a range of vertebrate species: horse, cow, reindeer, sheep, pig, dog, cat, rabbit, mink, hamster, parrot, and duck. …”
    Get full text
    Article