Search alternatives:
peers » peer (Expand Search)
beers » bears (Expand Search), beer (Expand Search), bers (Expand Search)
bees » bee (Expand Search), sees (Expand Search), fees (Expand Search)
besars » besar (Expand Search), bears (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
peers » peer (Expand Search)
beers » bears (Expand Search), beer (Expand Search), bers (Expand Search)
bees » bee (Expand Search), sees (Expand Search), fees (Expand Search)
besars » besar (Expand Search), bears (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
-
261
Electroweak three-body decays in the presence of two- and three-body bound states
Published 2024“…Recently, formalism has been derived for studying electroweak transition amplitudes for three-body systems both in infinite and finite volumes. …”
Get full text
Article -
262
Crowd monitoring and detection
Published 2022“…However, it requires a lot of manpower to check the scanning pass and vaccination status which always lead to a long queue and make social distance hard to maintain. …”
Get full text
Final Year Project (FYP) -
263
Non-normal distribution of residual flexural strengths of steel fiber reinforced concretes and its impacts on design and conformity assessment
Published 2022“…The logarithmic transformation provides a practical and convenient approach to design and to check the conformity of log-normally distributed SFRC properties adopting existing criteria. …”
Get full text
Journal Article -
264
Design of a hybrid neural spike detection algorithm for implantable integrated brain circuits
Published 2016“…Once a potential spike is detected, NEO is executed to check whether the detected spike by absolute thresholding is valid. …”
Get full text
Get full text
Conference Paper -
265
A random-key genetic algorithm-based method for transportation network vulnerability envelope analysis under simultaneous multi-link disruptions
Published 2024“…Transportation network vulnerability envelope (TNVE), constituted by the upper and lower bounds of network performance among all possible disruption scenarios, has recently been proposed as a systematic tool to characterize the impact of simultaneous disruptions of multiple links in a transportation network. …”
Journal article -
266
Exploring the development of a firewall using Windows filtering platform
Published 2009“…Due to the awareness of a need for personal firewall to protect their privacy, demand for personal firewall has been increasing exponentially. Different companies produce personal firewall in different ways, each promoting their best functionality. …”
Get full text
Final Year Project (FYP) -
267
Universal resilience patterns in labor markets
Published 2021“…Further, cities that increase their job connectivity see increasing wage bills, and workers of embedded occupations enjoy higher wages than their peers elsewhere. Finally, we show how job connectivity may clarify the augmenting and deleterious impact of automation in US cities. …”
Get full text
Article -
268
Gene-primer a PCR primer design program
Published 2008“…In addition, BLAST algorithm is utilized for the purpose of primer specificity check. In summary, selected primers adhered to both physico-chemical criteria and also display specificity to intended binding site in the genome.…”
Get full text
Thesis -
269
Expectations of undergraduates upon graduation and their means of financing it
Published 2013“…The MAS restrictions on unsecured personal loans and car loans, introduced in February 1995, is designed to check the sharp increases in personal loans and car loans over the years.…”
Get full text
Final Year Project (FYP) -
270
Phase separation in the putative fractional quantum hall A phases
Published 2025“…Finally, we uncover a new property of entanglement spectra that can be used as a check for the accuracy of numerics.…”
Journal article -
271
Taking data feminism to school: A synthesis and review of pre‐collegiate data science education projects
Published 2024“…In this review paper, we draw on principles from data feminism to review 42 different educational research and design approaches that engage youth with data, many of which are educational technology intensive and bear on future data-intensive educational technology research and design projects. …”
Get full text
Article -
272
Comparison of Machine Learning-Based Methods for Narrowband Blind Adaptive Beamforming
Published 2024“…Traditional blind source separation methods such as CMA, SOBI, JADE, and FastICA tend to be highly effective at beamforming datasets with moderate to large sample supports, but they do not perform well when they only have access to a limited number of data samples. They also bear the disadvantage that the appropriate algorithm must be selected based on the properties of the expected signal. …”
Get full text
Thesis -
273
Easing the “second-shift” burden : grandparental childcare and the subjective wellbeing of working mothers in Singapore
Published 2020“…However, it is still common for working mothers to bear the brunt of both domestic and paid work. In the present study, I explored the role of grandparents as providers of childcare for their grandchildren in contemporary Singapore. …”
Get full text
Final Year Project (FYP) -
274
The other side of the Elbe River: interventions in art, modernity, and coloniality in Poland
Published 2023“…<p>The artistic practices of Zofia Stryjeńska (1891-1976), Władysław Hasior, (1928-1999), Teresa Murak (1949-) and Roman Stańczak (1969-) all bear testimony – in their own distinct ways – to the ‘shock of the new’, the massive rupture brought by modernisation and capitalism in twentieth-century Poland. …”
Thesis -
275
USRP-based wireless communication demonstrations for capacity improvement: from coding and waveform design perspectives
Published 2025“…To address the impact of block fading on the bit error rate, researchers proposed a novel coding method based on the principle of Low Density Parity Check (LDPC) code, referred to as the Root-Protograph LDPC (RP-LDPC) code. …”
Get full text
Thesis-Master by Coursework -
276
15.665B Power and Negotiation, Fall 2002
Published 2002“…You will learn and practice the technical skills and analytic frameworks that are necessary to negotiate successfully with peers from other top business schools, and you will learn methods for developing the powerful social capital you will need to rise in the executive ranks of any organization. …”
Get full text
Learning Object -
277
HFP 303E - Asian Thought: Indian, Chinese, And Japanese June 2016
Published 2016“…Please check that this examination paper consists of FOUR pages of printed material before you begin the examination. …”
Get full text
Teaching Resource -
278
Wrapped branes and punctured horizons
Published 2020“…We present explicit AdS5 solutions dual to these SCFTs and check the holographic duality by showing the non-trivial agreement of ’t Hooft anomalies.…”
Journal article -
279
Wrapped branes and punctured horizons
Published 2019“…We present explicit AdS5 solutions dual to these SCFTs and check the holographic duality by showing the non-trivial agreement of ’t Hooft anomalies. …”
Internet publication -
280
Promoting strategic internal communication in governance to enhance employee creativity in organization
Published 2024“…The results indicate that when internal communication and leadership communication in governance are symmetrical, individuals are more likely to receive feedback from a variety of interpersonal sources, including supervisors, colleagues, and peers from different departments. This enhances creativity. …”
Get full text
Article