Search alternatives:
ceers » cheers (Expand Search), peers (Expand Search), beers (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), sheer (Expand Search)
cheens » cheen (Expand Search), cheers (Expand Search)
chens » chen (Expand Search), cheng (Expand Search), chess (Expand Search)
cheeks » cheers (Expand Search), cheek (Expand Search)
checks » check (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
ceers » cheers (Expand Search), peers (Expand Search), beers (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), sheer (Expand Search)
cheens » cheen (Expand Search), cheers (Expand Search)
chens » chen (Expand Search), cheng (Expand Search), chess (Expand Search)
cheeks » cheers (Expand Search), cheek (Expand Search)
checks » check (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
-
121
Transport of intensity phase imaging by intensity spectrum fitting of exponentially spaced defocus planes
Published 2014“…We validate our technique experimentally by recovering the phase of human cheek cells in a brightfield microscope.…”
Get full text
Get full text
Journal Article -
122
Chaotic neural networks for solving combinatorial optimization problems
Published 2008“…The thesis re-examine Chen and Aihara's experiments on solving TSP by extensive simulations. …”
Get full text
Thesis -
123
Three essays on the funds allocation of U.S. Firms
Published 2018“…In essay two, we employ comprehensive measures of investment and cash flow, and evaluate the findings of Chen and Chen (2012) that the investment-cash flow sensitivity of U.S. firms has disappeared over time. …”
Get full text
Get full text
Thesis -
124
Bombs away.
Published 2012“…Bombs Away is a 3D animated short film produced by Junwei Tong, Kenneth Chen and Gabriel Yeong. It is about an army commander who takes up painting, seeking solace from the ravages of war.…”
Get full text
Final Year Project (FYP) -
125
A two sample size estimator for large data sets
Published 2025“…As an alternative, we show how the asymptotically efficient CEP-GMM estimator of Chen et al. (2005) and Chen et al. (2008) can also be used to reduce computational cost in our setting. …”
Journal article -
126
Expectations of undergraduates upon graduation and their means of financing it
Published 2013“…The MAS restrictions on unsecured personal loans and car loans, introduced in February 1995, is designed to check the sharp increases in personal loans and car loans over the years.…”
Get full text
Final Year Project (FYP) -
127
The new Chinese women
Published 2015“…This paper will thus argue that both Chen Ran and Yan Geling both portray the stereotypical female sexuality as well as alternatives of it. …”
Get full text
Final Year Project (FYP) -
128
That mysterious man
Published 2024“…Xu An reports to his captain Chen Yi. Xu An's main mission is to find clues on Zhang Xu's daily actions in Tang Nightclub. …”
Get full text
Thesis-Master by Coursework -
129
Recommendation in location based social networks
Published 2013“…Temporal information in check-ins which interconnects users and point-of-interests have significant value in LBSNs. …”
Get full text
Final Year Project (FYP) -
130
Solving nondeterministic polynomial complete problems optically and the design of its light source
Published 2013“…Compare with the conventional computer calculation method, the problem solving time is reduced. This result is cheerful since all the NP-complete problems are inter convertible. …”
Get full text
Final Year Project (FYP) -
131
Triangular angle rigidity for distributed localization in 2D
Published 2022“…More importantly, inspired by Laman's theorem, we propose a topological, necessary and sufficient condition to check generic triangular angle rigidity. Based on the results on triangular angle rigidity, both algebraic and topological localizability conditions are developed, which are necessary and sufficient when the number of anchor nodes in the network is two. …”
Get full text
Journal Article -
132
Preprocessing and authentication of 2D barcodes
Published 2013“…In this thesis, we investigate the detection step of a barcode by modeling its finder pattern as a 2D signal with finite rate of innovations and reconstructing it through block by block operation. Then, a quality checking step of the barcode images is added to reject those poor quality images for saving the time in processing the undecodable images and avoiding wrongly decoded information. …”
Get full text
Thesis -
133
Membrane compaction in forward osmosis process
Published 2021“…The TFC membranes were continuously tested in FO experiments for 24 h by using DI water as feed and NaCl solutions of different concentrations as draw solution, and their performances were checked again using fresh feed solutions. At the end of FO experiments, all TFC membranes experienced water flux and salt flux decline to different extents. …”
Get full text
Journal Article -
134
Secure code execution on cloud-based infrastructure with application containers
Published 2017“…It provides a place for students to check the correctness of their code online. It will definitely decreases the workload of professors and protect their PC from the untrusted code. …”
Get full text
Final Year Project (FYP) -
135
Access structures of elliptic secret sharing schemes
Published 2013“…It is a central problem in secret sharing to understand the access structures of secret sharing schemes. In Chen and Kramer, secret sharing schemes from algebraic-geometric codes and their applications in secure multiparty computation were proposed and studied. …”
Get full text
Get full text
Journal Article -
136
0-1 Knapsack in Nearly Quadratic Time
Published 2024“…On the upper bound side, currently the fastest algorithm runs in 𝑂e(𝑛 + 𝑤 12/5 max ) time (Chen, Lian, Mao, and Zhang 2023), improving the earlier 𝑂(𝑛 + 𝑤 3 max)-time algorithm by Polak, Rohwedder, and Węgrzycki (2021). …”
Get full text
Article -
137
Moonchild.
Published 2009“…Being the product of an extremely close collaboration with my partner Chen Yanyun, we will most probably have different yet similar experiences expressed in each of our papers. …”
Get full text
Final Year Project (FYP) -
138
Evaluation of the music collection at the National Institute of Education Library
Published 2011“…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
Get full text
Thesis -
139
New optimal asymmetric quantum codes from constacyclic codes
Published 2014“…The first class is the asymmetric quantum codes with parameters [[q2 + 1, q2 + 1 - 2(t + k + 1), (2k + 2)/(2t + 2)]]q2 where q is an odd prime power, t, k are integers with , which is a generalization of [J. Chen, J. Li and J. Lin, Int. J. Theor. Phys. 53 (2014) 72, Theorem 2] in the sense that we do not assume that q ≡1 (mod 4). …”
Get full text
Get full text
Journal Article -
140
Effective and efficient topic mining and exploration from geo-textual data
Published 2018“…However, most of the existing methods mine topics from check-in datasets from Foursquare. Because each check-in often consists of limited textual information, and most of the users only shared few check-ins, it is difficult to discover meaningful topics of individuals from the check-in data. …”
Get full text
Thesis