Search alternatives:
spink » skink (Expand Search)
spinggga » skinggga (Expand Search)
spin » skin (Expand Search)
spink » skink (Expand Search)
spinggga » skinggga (Expand Search)
spin » skin (Expand Search)
-
2041
Bergin and Garfield's Handbook of Psychotherapy and Behavior Change /
Published 2020“…In recognition of the 50th anniversary, this edition contains a Foreword by Allen Bergin while the Handbook covers the following main themes: historical and methodological issues, measuring and evidencing change in efficacy and practice-based research, therapeutic ingredients, therapeutic approaches and formats, increasing precision and scale of delivery, and future directions in the field of psychotherapy research. …”
Get full text
Get full text
software, multimedia -
2042
Unveiling the facade of blog posts to reveal subjective well-being : an exploratory study.
Published 2012“…In this exploratory study to form a bridge between existing methods to gauge the well-being of people and the usage of social media as a data source, we find that there are substantial links between the subjective and objective well-being of people and the feelings expressed by people in blogs. Our two main findings demonstrate that eight out of 11 of the regressions involving the objective ranking as the main independent variable show the objective ranking having the correct expected sign at at least the 10% significance level. …”
Get full text
Final Year Project (FYP) -
2043
Efficient algorithms for embedded optimisation-based control
Published 2018“…System of linear equations with the saddle point type is the main computational load in some MPC-tailored algorithms. …”
Get full text
Get full text
Thesis -
2044
Unravelling the degradation pathways and charging mechanism in the Li-O2 battery: the role of singlet oxygen
Published 2022“…In the LOB literature, <sup>1</sup>O<sub>2</sub> is mainly detected and quantified using DMA, a <sup>1</sup>O<sub>2</sub> trap. …”
Thesis -
2045
Component-based security under partial compromise
Published 2018“…</p> <p>We finish with two main conclusions. First, the time is now right for formal methods. …”
Thesis -
2046
Frailty trajectories preceding dementia in the US and UK
Published 2024“…</p> <p><strong>Exposure: </strong>Frailty was the main exposure, with participants’ degrees of frailty quantified using retrospectively calculated frailty index scores.…”
Journal article -
2047
Mortality rates among patients successfully treated for hepatitis C in the era of interferon-free antivirals: population based cohort study
Published 2023“…Drug and liver related causes of death were the main drivers of excess mortality. These findings highlight the need for continued support and follow-up after successful treatment for hepatitis C to maximise the impact of direct acting antivirals.…”
Journal article -
2048
Safeguarding PU air filter production: design innovations for risk management
Published 2023“…This study focuses on the PU Air Filter Production Line at a top-tier Malaysian automotive parts manufacturer. …”
Get full text
Conference or Workshop Item -
2049
Analysis of visitors’ mobility patterns through random walk in the Louvre Museum
Published 2024“…A random walk is a minimalistic model providing a reference line for the frequency of sequences as induced by the graph structure of the museum. …”
Get full text
Article -
2050
Mach 3.5 Compression Corner Control Using Microvortex Generators
Published 2024“…Micro-ramp, standard ramped-vane, and inverted ramped-vane VGs all cause the separation line to ripple and become more three-dimensional, but none eliminate it altogether. …”
Get full text
Article -
2051
Assessing Early Stage Design Sketches and Reflections on Prototyping
Published 2024“…This study proposes a rubric for assessing the quality of novice designers’ early stage design sketches including line smoothness, proportion, and understandability. …”
Get full text
Article -
2052
Point defect–dislocation interactions in BEOL-compatible Ge-on-Si epitaxy
Published 2024“…Reduced thermal budget is required for back-end-of-line (BEOL) integration of application specific functionality into the multilevel metal stack of a processor “substrate.” …”
Get full text
Article -
2053
-
2054
Cell activation-based screening of natively paired human T cell receptor repertoires
Published 2025“…We then screened TCRα:β libraries expressed in an immortalized cell line using peptide-pulsed antigen-presenting cells and sequenced activated clones to identify the cognate TCRs. …”
Get full text
Article -
2055
Three-dimensional flow structures and vorticity control in fish-like swimming
Published 2005“…We employ a three-dimensional, nonlinear inviscid numerical method, in conjunction with experimental data from live fish and from a fish-like robotic mechanism, to establish the three-dimensional features of the flow around a fish-like body swimming in a straight line, and to identify the principal mechanisms of vorticity control employed in fish-like swimming. …”
Get full text
Article -
2056
Richness and diversity in dust stormborne biomes at the Southeast Mediterranean
Published 2014Get full text
Get full text
Journal Article -
2057
Nitrogen-doped graphene-supported transition-metals carbide electrocatalysts for oxygen reduction reaction
Published 2015Get full text
Get full text
Journal Article -
2058
-
2059
A crosstalk-immune sub-THz All-surface-wave I/O transceiver in 65-nm CMOS
Published 2020“…It is further integrated into the all-surface-wave I/O with a surface-wave transmission line and matching converter. Measured results show that the proposed dual-channel I/O delivers a localized 140 GHz surface-wave signal, demonstrating crosstalk-immune on-chip transmission by supporting 13.5 Gb/s data-rate communication with 2.6 PJ/bit Power efficiency and a bit-error rate less than 10^(-12).…”
Get full text
Conference Paper -
2060
Detecting adversarial samples for deep neural networks through mutation testing
Published 2020“…Finding a defence mechanism for these attacks are imperative in ensuring the safe operation of CNNs. The first line of defence for CNNs against adversarial attacks is the detection of the adversarial images. …”
Get full text
Final Year Project (FYP)