Showing 661 - 680 results of 2,671 for search '((pin OR (spie OR (spinggned OR spingggned))) OR (((anna OR (singal OR saina)) OR spinn) OR long))', query time: 0.19s Refine Results
  1. 661
  2. 662

    Studies for single bunch and multi-bunch beam instabilities in the Diamond-II booster by Husain, R, Wang, S, Fielder, RT, Martin, IPS, Burrows, PN

    Published 2024
    “…The single bunch charge will be limited by short range wakefields in the booster, and long-range wakefields limit the charge for the multi-bunch trains. …”
    Conference item
  3. 663

    Machine Learning Approaches for the Prediction of Postoperative Major Complications in Patients Undergoing Surgery for Bowel Obstruction by Mazzotta, Alessandro D., Burti, Elisa, Causio, Francesco Andrea, Orlandi, Alex, Martinelli, Silvia, Longaroni, Mattia, Pinciroli, Tiziana, Debs, Tarek, Costa, Gianluca, Miccini, Michelangelo, Aurello, Paolo, Petrucciani, Niccolò

    Published 2024
    “…Mazzotta 1,2ORCID,Elisa Burti 3,Francesco Andrea Causio 4,*ORCID,Alex Orlandi 5,Silvia Martinelli 4,Mattia Longaroni 6,Tiziana Pinciroli 7,Tarek Debs 8,Gianluca Costa 9ORCID,Michelangelo Miccini 10ORCID,Paolo Aurello 3 andNiccolò Petrucciani 3 1 Department of Surgery, Vannini General Hospital, Oncological and General Surgery, 00177 Rome, Italy 2 The BioRobotics Institute, Sant’Anna School of Advanced Studies, 56127 Pisa, Italy 3 Department of Medical and Surgical Sciences and Translational Medicine, Division of General and Hepatobiliary Surgery, St. …”
    Get full text
    Article
  4. 664

    The Cognitive Underpinnings of Legal Complexity by Martínez, Eric

    Published 2024
    “…Although principles of communicative efficiency and legal doctrine dictate that laws be comprehensible to the common world, legal documents have long been attested to be incomprehensible to those who are required to comply with them (i.e. everyone). …”
    Get full text
    Thesis
  5. 665

    Mitigating Undercutting Attacks: A Study on Mining and Transaction Fee Behavior by Bao, Claire

    Published 2024
    “…These attacks could cause repeated forking of the blockchain, thereby rendering Bitcoin unstable and less secure long-term. The original paper by Carlsten et. al. proposing these attacks made assumptions about the future mining environment. …”
    Get full text
    Thesis
  6. 666

    On the commute travel pattern with compressed work schedule by Su, Qida, Wang, David Zhi Wei

    Published 2022
    “…On top of that, the effects of CW on firms’ productivity are incorporated into our long-run analysis. At long-run equilibrium, no employers and employees can benefit by unilaterally switching their schedule type or changing their schedule design. …”
    Get full text
    Journal Article
  7. 667
  8. 668

    Improving electrochemical hybridization assays with restriction enzymes by Zhou, Xingcheng, Zamani, Marjon, Austin, Katherine, De Bock, Marieke, Ullola, Joshua Chaj, Rikia, Smah, Furst, Ariel L.

    Published 2024
    “…Thus, we have further established guidelines for REH design to serve as a generalizable platform for robust electrochemical detection of long nucleic acids.…”
    Get full text
    Article
  9. 669
  10. 670

    Point cloud based loop detection and localization by Chen, Yihuang

    Published 2020
    “…SLAM is an important technique for lots of localization methods, while most of the SLAM methods would suffer from drift in long-time processing. Loop closure detection is an effective method to correct the long-time drift and improve the result of SLAM. …”
    Get full text
    Thesis-Master by Coursework
  11. 671
  12. 672

    A study of inflation in China by Hu, Xiaoli, Xu, Jiajia, Yang, Wanyu

    Published 2012
    “…We remark that in the long run, the primary source of inflation in China is growth of money supply or bank loans. …”
    Get full text
    Final Year Project (FYP)
  13. 673

    Novel modulo multipliers for moduli 2^n-1, 2^n and 2^n+1. by Ramya Muralidharan

    Published 2012
    “…Long word-length integer multiplication is widely acknowledged as the bottleneck operation in public key cryptographic and signal processing algorithms. …”
    Get full text
    Thesis
  14. 674

    Artisitck A : a new, convenient way of light painting by Ng, Su Hui

    Published 2016
    “…Light painting is a photographic technique in which exposures are made by moving a hand- held light source while taking a long exposure photograph. The conventional method for light painting is limited to a single light source and is relatively difficult to adopt. …”
    Get full text
    Final Year Project (FYP)
  15. 675

    CoTracker: it is better to track together by Karaev, N, Rocco, I, Graham, B, Neverova, N, Vedaldi, A, Rupprecht, C

    Published 2023
    “…We introduce CoTracker, a transformer-based model that tracks a large number of 2D points in long video sequences. Differently from most existing approaches that track points independently, CoTracker tracks them jointly, accounting for their dependencies. …”
    Internet publication
  16. 676

    CoTracker: it is better to track together by Karaev, N, Rocco, I, Graham, B, Neverova, N, Vedaldi, A, Rupprecht, C

    Published 2024
    “…We introduce CoTracker, a transformer-based model that tracks a large number of 2D points in long video sequences. Differently from most existing approaches that track points independently, CoTracker tracks them jointly, accounting for their dependencies. …”
    Conference item
  17. 677

    BIRDSONG, SPEECH, AND LANGUAGE : Exploring the Evolution of Mind and Brain / by Bolhuis, Johan J., editor 655622, Everaert, Martin, editor 655621, Berwick, Robert C., editor 421639, Chomsky, Noam, editor 360231

    Published 2016
    “…Prominent scholars consider the cognitive and neural similarities between birdsong and human speech and language. Scholars have long been captivated by the parallels between birdsong and human speech and language. …”
    text
  18. 678

    Our Tethered Skates / by Naadhira Zahari, author 655828, Naadhira Zahari, editor 655828

    Published 2023
    “…She must choose between fighting against the Frosts—a long-time enemy—or going home without finding out more about her sister’s disappearance. …”
    text
  19. 679

    Measuring equity risk premium and risk aversion in the US. by Chong, Hui Han., Thng, Anthony Lian Guan., Soo, Jia Hao.

    Published 2008
    “…We attempt to estimate and analyze the historical time series of risk aversion over a long time period using as long series data as possible. …”
    Get full text
    Final Year Project (FYP)
  20. 680

    StudentGO web application by Xie, Zijian

    Published 2023
    Get full text
    Final Year Project (FYP)