Search alternatives:
bone » one (Expand Search), done (Expand Search), bond (Expand Search)
hand » had (Expand Search)
bound » found (Expand Search)
bone » one (Expand Search), done (Expand Search), bond (Expand Search)
hand » had (Expand Search)
bound » found (Expand Search)
-
2361
On a problem of El-Zahar and Erdős
Published 2023“…Is it true that if <i>G</i> is a graph with bounded clique number, and sufficiently large chromatic number, then it has two anticomplete subgraphs, both with large chromatic number? …”
Journal article -
2362
Dissonances in care: childhood, well-being, and the politics of welfare in Japan
Published 2024“…The welfare system still does not help children achieve permanence as social relationships remain structurally bounded, yet it is the local level acts of care that mediate subjectivity that present the most significance for improving policy and practice.…”
Thesis -
2363
CSQUiD: an index and non-probability framework for constrained skyline query processing over uncertain data
Published 2024“…Given a collection of objects with uncertain data, the CSQUiD framework constructs the minimum bounding rectangles (MBRs) by employing the X-tree indexing structure. …”
Get full text
Article -
2364
Deep learning based monocular visual-inertial odometry
Published 2021“…This combination can be used in many applications, from smart mobile phones to micro aerial vehicles. Traditional methods attempt to extract features from visual information, track them in consecutive frames, and tightly optimize the relation between feature points in consecutive camera frames with the secured IMU information to solve the problem. …”
Get full text
Thesis-Doctor of Philosophy -
2365
Design and verification of carefree maneuvering protection for a high performance fighter aircraft
Published 2024“…This is then augmented with a novel angle of attack protection that comes into play only when the pilot inputs cause the aircraft to exceed the incidence on the positive or negative side (one sided protection), while maintaining the rate command attitude hold behavior within the normal operational bounds of angle of attack. Traditional methods of piloted simulation with a representative cohort of pilots can be time consuming to set up and may not give sufficient confidence whether a departure protection scheme is effective. …”
Get full text
Journal Article -
2366
Exploring integrity of AEADs with faults: definitions and constructions
Published 2023“…Concerning symmetric-key operating modes, such as Authenticated Encryption with Associated Data (AEAD), the state-of-the-art mainly addresses the passive Side-Channel Attacks (SCA) in the form of leakage resilient cryptography. So far, only a handful of work address Fault Attacks (FA) in the context of AEADs concerning the fundamental properties – integrity and confidentiality. …”
Get full text
Journal Article -
2367
Brain networks underlying tactile softness perception : a functional magnetic resonance imaging study
Published 2019“…Fifty-six healthy right-handed participants estimated perceived softness magnitude using their right middle finger. …”
Get full text
Get full text
Journal Article -
2368
Nanoconfinement of magnesium hydride in porous scaffolds for hydrogen storage: Kinetics, thermodynamics, and future prospects
Published 2025“…Among the frequently reported hydrides, magnesium hydride (MgH2) gained significant consideration as a highly prospective material for energy storage applications. Nevertheless, the hands-on use of MgH2 is restricted by its high thermodynamic barriers and slow kinetics. …”
Get full text
Article -
2369
Development of a software application for teaching computer networking
Published 2021“…This has been shown to make learning more enjoyable and effective, while also promoting independent learning. The hands-on nature also increases immersion for many students, allowing them to put the theoretical principles into use with practical examples. …”
Get full text
Final Year Project (FYP) -
2370
Lessons in ecology and conservation from a tropical forest fragment in Singapore
Published 2022“…Exotic tree species are confined to recovering secondary forest fringes and do not threaten the primary forest, except for perhaps shade tolerant Pará rubber and a handful of cultivated fruit trees. Studies of birds and plants found that life history differences could account for differences in genetic connectivity or isolation for different species, with population genetic implications for other taxa. …”
Get full text
Journal Article -
2371
An investigation of friction-based tendon sheath model appropriate for control purposes
Published 2013“…The tendon sheath mechanism plays an important role in many robotic systems from surgical devices to robot hands. However, many unexpected properties such as nonlinear hysteresis and backlash, which appear in the tendon sheath system, cause major losses in force transmission. …”
Get full text
Get full text
Journal Article -
2372
Development and implementation of a 3d-HDR brachytherapy program for cervical cancer in a sub-Saharan African centre
Published 2024“…</p> <p><strong>METHOD AND METERIALS: </strong>The implementation process required investment in infrastructure: creating a dedicated brachytherapy suite equipped with modern technology; and human capital: conducting both virtual and hands-on training for staff; and involving international experts during the initial treatment phases. …”
Journal article -
2373
Pathway and network analysis of more than 2500 whole cancer genomes
Published 2020“…However, non-coding cancer driver mutations are less well-characterized and only a handful of recurrent non-coding mutations, most notably TERT promoter mutations, have been reported. …”
Journal article -
2374
Self-learning shape recognition in medical images
Published 2019“…Experiments are conducted using two representative datasets, a set of 30 public CT kidneys and a set of 49 internal MRI ankle bones. Embedded into an existing segmentation framework, experimental results show that SSM built with the proposed RKPCA outperforms the state-of-the-art modeling techniques in terms of model quality and segmentation accuracy. …”
Get full text
Get full text
Thesis -
2375
Quantum Speed-ups for String Synchronizing Sets, Longest Common Substring, and \(k\) -mismatch Matching
Published 2024“…Our result improves upon previous upper bounds $\tilde O(\min \{n/d^{1/2}, n^{2/3}\})$ (Le Gall and Seddighin ITCS 2022, Akmal and Jin SODA 2022), and answers an open question of Akmal and Jin. …”
Get full text
Article -
2376
-
2377
-
2378
Essays on oil price fluctuations, financial markets and international trade
Published 2014“…The second essay applies the bounds testing approach to cointegration to the sampling period from Jan-1986 to Dec-2011 to investigate the relationships between the prices of two strategic commodities (oil and gold) and the macro-financial variables (interest rate, exchange rate and stock price). …”
Get full text
Thesis -
2379
Direction finding for UWB RFID system in dense cluttered environments
Published 2014“…A channel model of plane waves from far-field reflectors or scatterers superimposed with near-field interferences is proposed, and the Cram´er-Rao bounds for ranging and direction finding are derived to analyze the channel effects. …”
Get full text
Thesis -
2380
Master curves for FENE-P fluids in steady shear flow
Published 2024“…The FENE-P (Finitely-Extensible Nonlinear Elastic) dumbbell constitutive equation is widely used in simulations and stability analyses of free and wall-bounded viscoelastic shear flows due to its relative simplicity and accuracy in predicting macroscopic properties of dilute polymer solutions. …”
Get full text
Article