-
6541
Non-normal distribution of residual flexural strengths of steel fiber reinforced concretes and its impacts on design and conformity assessment
Published 2022“…The logarithmic transformation provides a practical and convenient approach to design and to check the conformity of log-normally distributed SFRC properties adopting existing criteria. …”
Get full text
Journal Article -
6542
CT sigma delta ADC for audio applications
Published 2009“…The non-idealities simulation was extensively run to check how much the overall system can take non-idealities behaviors of gain, gain bandwidth, slew-rate and linearity while meeting performance requirements. …”
Get full text
Final Year Project (FYP) -
6543
Towards explainable and semantically coherent claim extraction for an automated fact-checker
Published 2024“…Therefore, this project aims to enhance the claim extraction process of an automatic fact-checker, improve the accuracy of fact-checking, and mitigate the limitations associated with LLMs' reliance on outdated information. …”
Get full text
Final Year Project (FYP) -
6544
An ultra low-power precision sample-and-hold circuit for biomedical application
Published 2010“…The parameters that were used to check the precision of the S/H circuit are hold pedestal and total harmonic distortion. …”
Get full text
Final Year Project (FYP) -
6545
Online game for Chinese chess
Published 2010“…Research from various sources such as internet, books and journals was done to enhance in understanding of the development of an online Chinese Chess game.The results had indicated that a simple move of a chess piece involves a lot of checking and consideration on the types of moves possible. …”
Get full text
Final Year Project (FYP) -
6546
Three dimensional numerical manifold method and rock engineering applications
Published 2011“…The proposed contact treatment procedure consists of distinct features, including: three operation phases for the checking process, NMM hierarchical contact system, contact warning based on mathematical patterns (MPs), transformation of two essential entrance modes, transferring contact information, penalty treatment for contact constraints, open-closed iteration process, and lagged verification on contact state. …”
Get full text
Thesis -
6547
Eye movement feature extraction for driver vigilance classification
Published 2015“…Analysis of variance (ANOVA) test was employed to check if there exist significant differences among three stages within one driving period. …”
Get full text
Final Year Project (FYP) -
6548
A signal through the noise: accurate determination of hydrogen atom positions in crystal structures and optimisation of Laue neutron diffraction methods
Published 2021“…This focuses on:</p> <p>Recommendations for the efficient collection of Laue neutron data, in order to optimise the data set completeness and awarded beam-time; strategic considerations for how to best answer the scientific question(s) at hand in a Laue neutron experiment, whilst planning against future contingencies; improving methods for crystal packing and shipping, particularly for air and moisture sensitive materials; discussing issues arising from ice forming on the crystal during a Laue neutron diffraction experiment, and methods for minimising this problem; more effectively modelling disorder using ring shapes, in the crystallographic refinement package CRYSTALS; providing rationale for Laue neutron specific checkCIF comments.</p> <p>Alongside the aforementioned research projects, the relevant history and theory contextualising the crystallographic methods used is presented.…”
Thesis -
6549
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…SA-EADC adds another phase as “sensor redundancy check and activation” to EADC. It identifies the redundant sensor nodes, whose sensing coverage area are also covered completely by their direct neighbors and turns off them. …”
Get full text
Thesis -
6550
15.571 Generating Business Value from Information Technology, Spring 2007
Published 2010“…The familiar components of the place: cash, checks, paper reports and documents, store fronts, and face to face meetings remain important, but less so. …”
Get full text
Learning Object -
6551
A multidisciplinary survey of computational techniques for the modelling, simulation and analysis of biochemical networks
Published 2011“…From a practical point of view, in silico experiments can be performed that would be very expensive or impossible to achieve in the laboratory, such as hypothesis-testing with regards to knock-out experiments or overexpression, or checking the validity of a proposed molecular mechanism. …”
Get full text
Get full text
Journal Article -
6552
Comparing analytical, micromagnetic and statistical channel models at 4 Tcbpsi patterned media recording
Published 2013“…In this work, we adapt the GFP model for BPMR and perform a comparison between densities predicted via the analytical and GFP models, by processing the signals from these models with the appropriate detectors and LDPC (low density parity check) decoders.…”
Get full text
Get full text
Journal Article -
6553
Brain Informatics : 14th International Conference, BI 2021, Virtual Event, September 17-19, 2021, Proceedings /
Published [202“…The 49 full and 2 short papers together with 18 abstract papers were carefully reviewed and selected from 90 submissions. …”
text -
6554
Human Centered Computing : 66th International Conference, HCC 2020, Virtual Event, December 14-15, 2020 : Revised Selected Papers /
Published [202“…The 28 full and 20 short papers presented in this volume were carefully reviewed and selected from a total of 133 submissions. …”
text -
6555
Adaptive Instructional Systems : Adaptation Strategies and Methods : Third International Conference, AIS 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Vir...
Published [202“…The total of 1276 papers and 241 poster papers included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. …”
text -
6556
HCI for Cybersecurity, Privacy and Trust : Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24-29...
Published [202“…The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. …”
text -
6557
Evaluation of wavelet filters based on EZW for ECG compression
Published 2008“…Since the wavelet transform plays a key role in the compression algorithm, the wavelet selection needs to be considered carefully.…”
Get full text
Thesis -
6558
The duties of the penetrator and the limits of consent
Published 2024“…This article argues that the focus should be on the penetrator and whether he was justified in acting in the way he did. This requires a careful assessment of the limited circumstances in which consent might provide a justification.…”
Journal article -
6559
Decomposing value gains – the case of the best leveraged buy-out ever
Published 2022“…The answer might be surprising and shows both the difficulty and pertinence of carefully decomposing the sources of value creation in Leveraged Buy-Outs.…”
Journal article -
6560
Molecular engineering of biomolecule-based functional nanodots for biomedical applications
Published 2020“…The biodots were developed through critical combinations of mainly amino acid, Serine, and carefully selected precursors such as PEI (polyethylenimine) and histamine. …”
Get full text
Thesis-Doctor of Philosophy