Showing 81 - 100 results of 592 for search '(bears OR (sheer OR (cheers OR checks)))*', query time: 0.44s Refine Results
  1. 81

    Single-Shot Decoding of Good Quantum LDPC Codes by Gu, Shouzhen, Tang, Eugene, Caha, Libor, Choe, Shin Ho, He, Zhiyang, Kubica, Aleksander

    Published 2024
    “…Quantum Tanner codes constitute a family of quantum low-density parity-check codes with good parameters, i.e., constant encoding rate and relative distance. …”
    Get full text
    Article
  2. 82

    Active Learning for Inference and Regeneration of Applications that Access Databases by Shen, Jiasi, Rinard, Martin

    Published 2025
    “…Konure also implements a regenerator that produces a translated Python implementation of the application that systematically includes relevant security and error checks.…”
    Get full text
    Article
  3. 83

    Inherently vulnerable? Ethnic geography and the intensity of violence in the Bosnian civil war by Di Salvatore, J

    Published 2015
    “…The results remain robust when accounting for the presence of the UN peacekeeping mission (UNPROFOR) and across several robustness checks.…”
    Journal article
  4. 84

    Linear A libation tables : a semitic connection explored by Eu Min, Niki Cassandra, Perono Cacciafoco, Francesco, Cavallaro, Francesco Paolo

    Published 2020
    “…Unlike the Linear B language (Mycenaean Greek), Minoan, the language hidden behind Linear A and still undeciphered, bears no apparent similarity to Greek, and any ‘translation’ of Linear A based provisionally on Linear B phonetic values has not produced any tangible result. …”
    Get full text
    Journal Article
  5. 85
  6. 86

    A three-membered diazo-aluminum heterocycle to access an Al=C π bonding species by Yan, Chenting, Kinjo, Rei

    Published 2022
    “…An X-ray study shows that the anionic part of 5 bears a considerable short exocyclic Al-C bond, and computational studies involving molecular orbital and natural bond orbital analysis indicate the Al=C π bonding character. …”
    Get full text
    Journal Article
  7. 87

    Secure image encryption based on an ideal new nonlinear discrete dynamical system by Lin, M. Rongming, Ng, Teng Yong

    Published 2018
    “…Extensive numerical experiment results have revealed that the proposed image encryption algorithm offers advantages of unlimited key space and high-level security, since those problematic periodic windows are no longer present within the key space, and it is extremely robust against known-plain-text attack, since the chaotic sequence generated bears no correlation whatsoever due to the folding effect of modulo operation. …”
    Get full text
    Get full text
    Journal Article
  8. 88

    Building SenticNet 7 by Perh, Zhi Hao

    Published 2021
    “…The error checking program utilizes the keyword extractor, sentiment analysis and synonyms functions. …”
    Get full text
    Final Year Project (FYP)
  9. 89

    Prescriptive analytics models for vessel inspection planning in maritime transportation by Yang, Ying, Yan, Ran., Wang, Shuaian

    Published 2024
    “…The inspection process involves identifying high-risk vessels, allocating surveyors, and conducting onboard checks. This study aims to optimize the selection and assignment process through a two-stage framework, balancing the benefits of identifying deficiencies against the costs of inspection delays. …”
    Get full text
    Journal Article
  10. 90

    Blockchain for RegTech: streamlining know your customer (KYC) pipelines by Tan, Valerie Huiying

    Published 2022
    “…With Decentralised Finance being developed to replace traditional financial services and transactions of virtual land being conducted on the Metaverse, these ecosystems often involve large amounts of money and require regulatory compliance checks. This calls for a solution that can interoperate effectively with these emerging technologies. …”
    Get full text
    Final Year Project (FYP)
  11. 91

    The midlife crisis by Giuntella, Osea, McManus, Sally, Mujcic, Redzo, Oswald, Andrew J., Powdthavee, Nattavudh, Tohamy, Ahmed

    Published 2022
    “…Instead the paper uses panel and through-time data on, in total, approximately 500,000 individuals. It checks that the key results are not due to cohort effects. …”
    Get full text
    Get full text
    Journal Article
  12. 92

    Flexible optical fiber probe for surface roughness evaluation of internal channels in additively manufactured components by Subbarao, Guru Prasad Arudi, Haridas, Aswin, Patinharekandy, Prabhathan, Kapur, Pulkit, Chan, Kelvin, Matham, Murukeshan Vadakke

    Published 2018
    “…However, being a stochastic process, there is minimal control over the surface quality and thus require adequate quality checks before implementation. In this context, this paper investigates a flexible optical fiber probe and speckle correlation measurements to quantitatively estimate the average surface roughness, Ra, of areas within internal channels. …”
    Get full text
    Get full text
    Conference Paper
  13. 93

    Perennial semantic data terms of use for decentralized web by Zhao, R, Zhao, J

    Published 2024
    “…This constitutes a “perennial” DToU language, where the policy authoring only occurs once, and we can conduct ongoing automated checks across users, applications and activity cycles. …”
    Conference item
  14. 94

    Effect of Dactylaria higginsii on interference of Cyperus rotundus with L. esculentum by Kadir, J.B., Charudattan, R., Stall, W.M., Bewick, T.A.

    Published 1999
    “…At 106 conidia ml-1, D. higginsii reduced the interference from C. rotundus, controlled C. rotundus better, and increased L. esculentum yield compared to the weedy checks.…”
    Article
  15. 95

    Effective 5D BIM requirements for risk mitigation during pre-contract stage. by Nazirul Fariq, Nazirul Fariq, Ismail, Syuhaida, Ab. Rani, Nur Izzati

    Published 2022
    “…Risk mitigation strategies are proposed to make a positive impact on the 5D BIM implementation, which consist of regular checks and balances, improve skills and knowledge through training and acquire suitable 5D BIM applications. …”
    Get full text
    Article
  16. 96
  17. 97

    Functional genetics of cancer and congenital disorders by Zak, J

    Published 2016
    “…An integrative analysis of cancer genomic data revealed that <em>PPP1R13B</em>, encoding ASPP1, bears many hallmarks of a tumour suppressor gene, despite being mutated at a low absolute frequency. …”
    Thesis
  18. 98

    Floquet Codes without Parent Subsystem Codes by Davydova, Margarita, Tantivasadakarn, Nathanan, Balasubramanian, Shankar

    Published 2024
    “…However, unlike the honeycomb code, it possesses an explicit CSS structure and its gauge checks do not form a subsystem code. Nevertheless, we show that our dynamic protocol conserves logical information and possesses a threshold for error correction. …”
    Get full text
    Article
  19. 99
  20. 100

    Mobile application for optical character recognition (OCR) of digits by Luah, Yee Teng

    Published 2021
    “…To further improve the recognition accuracy, an API is created for sanity checks based on the domain knowledge adopted from clinicians. …”
    Get full text
    Final Year Project (FYP)