Showing 321 - 340 results of 6,290 for search '((peers OR (cheers OR (checkers OR checks))) OR beer)', query time: 0.14s Refine Results
  1. 321

    Wrapped branes and punctured horizons by Bobev, N, Bomans, P, Gautason, FF

    Published 2020
    “…We present explicit AdS5 solutions dual to these SCFTs and check the holographic duality by showing the non-trivial agreement of ’t Hooft anomalies.…”
    Journal article
  2. 322

    Wrapped branes and punctured horizons by Bobev, N, Bomans, P, Gautason, FF

    Published 2019
    “…We present explicit AdS5 solutions dual to these SCFTs and check the holographic duality by showing the non-trivial agreement of ’t Hooft anomalies. …”
    Internet publication
  3. 323

    Characterizing 4-string contact interaction using machine learning by Erbin, Harold, Fırat, Atakan Hilmi

    Published 2024
    “…We also train a neural network distinguishing vertex from Feynman region. As a check, 4-tachyon contact term in the tachyon potential is computed and a good agreement with the results in the literature is observed. …”
    Get full text
    Article
  4. 324

    Is self-explanation better than explaining to a fictitious student when learning from video lectures? by Pi, Zhongling, Zhang, Yi, Shi, Dongyuan, Guo, Xin, Yang, Jiumin

    Published 2022
    “…It is unclear whether explaining to oneself (self-explanations) is more beneficial than explaining to a peer (instructional explanations). The benefits of writing instructional explanations on learning performance were not consistently found across diverse areas. …”
    Get full text
    Journal Article
  5. 325

    Riding the "HTS" wave : information cascades in the viewership of online videos. by Sim, Clarice Chwei Lin.

    Published 2010
    “…The exploding spread of online peer-posted videos on platforms such as YouTube has been phenomenal. …”
    Get full text
    Thesis
  6. 326

    Volunteering with Singapore’s vulnerable seniors : what is influencing the youths’ willingness? by Keh, Jun Yee

    Published 2018
    “…Second, youths generally cite interest and peer influence as their motivations to engage in voluntary work. …”
    Get full text
    Final Year Project (FYP)
  7. 327

    Lean Six Sigma in healthcare: a systematic literature review on motivations and benefits by McDermott, Olivia, Antony, Jiju, Bhat, Shreeranga, Jayaraman, Raja, Rosa, Angelo, Marolla, Giuliano, Parida, Ratri

    Published 2022
    “…The authors used a systematic literature review (SLR) approach to achieving the article’s purpose. Peer-reviewed journal articles published between 2011 and 2021 are considered to achieve the study objectives. …”
    Get full text
    Article
  8. 328

    Dynamic drug combination methods for suppressing bacterial antibiotics resistance adaptation by Bhone, Myint Kyaw

    Published 2014
    “…In this study, the effects of using conventional antibiotics in combination with phytochemicals were studied by using checker board methods and time-kill assays using 12 S. aureus strains. …”
    Get full text
    Thesis
  9. 329

    Probabilistic verification beyond context-freeness by Li, G

    Published 2024
    “…Notably, the PCTL* model checking procedure relies heavily upon the algorithm established for LTL. …”
    Thesis
  10. 330

    Globalization and environmental quality : insights from 128 countries by Le, Ha Chi

    Published 2020
    “…Fixed Effects (FE) is employed as the main estimation technique while panel Ordinary Least Squares (OLS), Feasible Generalized Least Squares (FGLS) and Driscoll-Kraay (D-K) standard errors estimations are employed as robustness check. The results indicate that while international integration has a detrimental impact on most components of the ecosystem, effect varies across income groups. …”
    Get full text
    Final Year Project (FYP)
  11. 331

    Attack detection for cyber-physical systems: a zonotopic approach by Li, Jitao, Wang, Zhenhua, Shen, Yi, Xie, Lihua

    Published 2023
    “…Two approaches, namely, projection and polytopic conversion, are presented to check the intersection situation. The detection performance is quantified using a stealthy attack set and the corresponding state estimation error set. …”
    Get full text
    Journal Article
  12. 332

    Petri net-based efficient determination of optimal schedules for transport-dominant single-arm multi-cluster tools by Yang, Fajun, Wu, Naiqi, Qiao, Yan, Zhou, Mengchu, Su, Rong., Qu, Ting

    Published 2018
    “…Thereafter, an efficient algorithm is developed to check the given conditions and find such a schedule efficiently if existing. …”
    Get full text
    Get full text
    Journal Article
  13. 333

    Development of software testing and analysis tools : Part A by Ng, Qing Xiang.

    Published 2009
    “…The patterns are: • Identical/Compliment-Decision Pattern • Mutually-Exclusive-Decision Pattern • Check-then-Do Pattern • Loop-by-Flag Pattern The scope of this project is to create a set of tools to facilitate detecting of such infeasible paths by detecting the conditions that fulfill the patterns mentioned above. …”
    Get full text
    Final Year Project (FYP)
  14. 334

    The application of microtremor survey method in investigating the geological formation of Singapore by Muhammad Azri Bin Omar.

    Published 2011
    “…A comparison between the results obtained from SPAC analysis as well as borehole information will also be shown to check for consistency.…”
    Get full text
    Final Year Project (FYP)
  15. 335

    Recommendation in location based social networks by Chen, Long.

    Published 2013
    “…Temporal information in check-ins which interconnects users and point-of-interests have significant value in LBSNs. …”
    Get full text
    Final Year Project (FYP)
  16. 336

    Design and development of a robot invigilator by Wu, Xiangran.

    Published 2013
    “…By applying this technology, the robot invigilator can do what a traditional invigilator need to do during an examination such like, timing for the duration, checking the attendance face-to-face. A backend exam registration system also has been developed to simulate the real case. …”
    Get full text
    Final Year Project (FYP)
  17. 337

    Target detection in stationary background by Liu, Lu.

    Published 2013
    “…The basic principle of target detection is to compare the current image with a reference image which is call the background image, from the comparison result to define whether there is a moving target in the image by checking the changing in the image, pixel by pixel. …”
    Get full text
    Final Year Project (FYP)
  18. 338

    Report on industrial attachment with Autodesk Asia Private Limited by Zhu, Chenyang

    Published 2015
    “…Few projects were undertaken during the internship at Autodesk including porting Memento to Mac OS X, add check video update functionality to Memento, Mesh Segmentation using OpenCL and design and implementation of Large Mesh Web Viewer. …”
    Get full text
    Final Year Project (FYP)
  19. 339

    Investigating growth and properties of perovskite single crystals by Tan, Kok Ho

    Published 2018
    “…X-ray diffraction was conducted to check the purity of methylammonium lead bromide perovskite crystals grown. …”
    Get full text
    Final Year Project (FYP)
  20. 340

    Symbolic verification and strategy synthesis for turn-based stochastic games by Kwiatkowska, M, Norman, G, Parker, D, Santos, G

    Published 2022
    “…Probabilistic model checking techniques for this class of models allow us to formally specify quantitative specifications of either collective or individual behaviour and then automatically synthesise strategies for the agents under which these specifications are guaranteed to be satisfied. …”
    Book section