Showing 7,501 - 7,520 results of 10,404 for search '(cars OR (((needs OR sees) OR peer) OR bear))*', query time: 0.14s Refine Results
  1. 7501
  2. 7502

    Political unrest under IMF programmes: labour mobility, fiscal conditionality, and democratic representation by Metinsoy, S

    Published 2017
    “…<p>What triggers political unrest under International Monetary Fund (IMF) programmes? Why do we see unrest—protests, strikes, and riots—in some countries under IMF programmes and not in others? …”
    Thesis
  3. 7503
  4. 7504
  5. 7505

    On strong semismoothness and superlinear convergence of complementarity problems over homogeneous cones by Nguyen, Hai Ha

    Published 2018
    “…The next parts of Chapter 2 discuss the application of the method for adjusting the strong semismoothness of projection onto second-order cones, then give a couple of counter examples to see the important things we need to notice when doing this method. …”
    Get full text
    Thesis
  6. 7506
  7. 7507

    Magical realism and representations of the cold war in Southeast Asia by Lye, Kit Ying

    Published 2016
    “…However, while there are acknowledgements by scholars that religious myths and pre-existing animistic beliefs continue to influence the way that the indigenous people understand their worlds, Southeast Asian authors (unlike many of their postcolonial peers), do not actively employ magical realism in their exploration of history and civil unrest in their writings, and when they do, are not employed to the same degree as postcolonial authors in other regions. …”
    Get full text
    Thesis
  8. 7508

    Ideas of intelligence across development : a look into children's implicit attitudes of the male = brilliant stereotype by Ng, Sara Hui Xin

    Published 2018
    “…These results prompt for further exploration of other possible factors such as cultural influences and other socialising agents such as teachers and peers that could have a greater influence on children’s development of this gender stereotype.…”
    Get full text
    Final Year Project (FYP)
  9. 7509
  10. 7510
  11. 7511
  12. 7512
  13. 7513
  14. 7514

    A tale of two shuffle algebras by Neguț, Andrei

    Published 2024
    “…In the present paper, we take an orthogonal viewpoint, and give shuffle algebra presentations for the “top” and “bottom” halves instead, starting from the evaluation representation 𝑈𝑞(𝔤𝔩˙𝑛)↷ℂ𝑛(𝑧) and its usual R-matrix 𝑅(𝑧)∈End(ℂ𝑛⊗ℂ𝑛)(𝑧) (see Faddeev et al. in Leningrad Math J 1:193–226, 1990). …”
    Get full text
    Article
  15. 7515

    Can a humanoid robot be part of the organizational workforce? A user study leveraging sentiment analysis by Mishra, Nidhi, Ramanathan, Manoj, Satapathy, Ranjan, Cambria, Erik, Magnenat-Thalmann, Nadia

    Published 2020
    “…The objective of this study is to analyze the effects of humanoid robots on customers in a work environment, and see if it can handle social scenarios. We propose to evaluate these objectives through two modes, namely: survey questionnaire and customer feedback. …”
    Get full text
    Conference Paper
  16. 7516

    Image artefact removal using deep learning by Sanchari, Das

    Published 2022
    “…The results are then compared to non-deep learning approaches, SSRQC method and Bilateral filtering, in order to see the differences in performance…”
    Get full text
    Final Year Project (FYP)
  17. 7517

    Complex channel characterization by Tay, Ron Yingren.

    Published 2009
    “…A comprehensive study and calculation was discussed with the interest to see the ducting effect over the sea channel at Hosba. …”
    Get full text
    Final Year Project (FYP)
  18. 7518

    Secure sharing and storage of genome data using blockchain technology by Mahtolia Ronan

    Published 2024
    “…The goal is to give control of the data to the owner and have them decide who gets to see the data and who doesn’t. The system will contain a front-end for the user to interact with and a backend that can be deployed on Ethereum. …”
    Get full text
    Final Year Project (FYP)
  19. 7519

    Protecting neural networks from adversarial attacks by Yeow, Zhong Han

    Published 2024
    “…The security benefits of the SSE implementation will also have to outweigh the cost for it to see realistic use. Other methods such as homomorphic encryption can be used on larger datasets and more complex models and may even be able to allow models to be trained while fully encrypted, protecting against more possibilities of adversarial attacks.…”
    Get full text
    Final Year Project (FYP)
  20. 7520

    On the evolution of the Kham agreement paradigm by DeLancey, Scott

    Published 2024
    “…Recent studies of the agreement systems of the "prono-minalizing" Tibeto-Burman languages (Bauman 1974, 1975, 1979, DeLancey 1980, 1981a, 1983, Caughley 1982, Thurgood 1985) have established that the suffixed "pronominal" verb agreement paradigm, once considered to be a late secondary development in a few western branches of the family, is in fact widespread throughout the TB languages, and traceable to the Proto-Tibeto-Burman level.2 There is no reasonable doubt that most of the agreement paradigms found in the family represent com¬mon inheritance -- often, to be sure, with considerable reana¬lysis and secondary alteration -- of an original paradigm in which the ST pronominal roots *na '1st person' and *na(n) '2nd person' were suffixed to the verb in a split ergative pattern. (See DeLancey 1981b for a discussion of the notion of split ergativity and its relevance to some of the data discussed here).…”
    Get full text
    Journal Article