Showing 181 - 200 results of 360 for search '(ceers OR (cheer OR (cheers OR ((chers OR (cheeks OR checks)) OR cher))))', query time: 0.22s Refine Results
  1. 181

    Probabilistic verification beyond context-freeness by Li, G

    Published 2024
    “…Notably, the PCTL* model checking procedure relies heavily upon the algorithm established for LTL. …”
    Thesis
  2. 182

    A vehicle social distancing management system based on LiFi COVID pandemic: real-time monitoring for smart buildings by Murad, Sallar S., Yussof, Salman, Oraibi, Bha-Aldan Mundher, Badeel, Rozin, Badeel, Banan, Alamoodi, A. H.

    Published 2024
    “…For this reason, each time a vehicle requests entry into the facility, a real-time test or check must be performed. This study proposes a real-time vehicle social distancing decision system for managing the number of vehicles (RT-VSDD) that adds an additional testing method besides the traditional testing phase (test reports from test centers) with a real-time vital health check at the building access request in order to reduce the risk of unidentified infected individuals. …”
    Get full text
    Article
  3. 183

    Globalization and environmental quality : insights from 128 countries by Le, Ha Chi

    Published 2020
    “…Fixed Effects (FE) is employed as the main estimation technique while panel Ordinary Least Squares (OLS), Feasible Generalized Least Squares (FGLS) and Driscoll-Kraay (D-K) standard errors estimations are employed as robustness check. The results indicate that while international integration has a detrimental impact on most components of the ecosystem, effect varies across income groups. …”
    Get full text
    Final Year Project (FYP)
  4. 184

    Attack detection for cyber-physical systems: a zonotopic approach by Li, Jitao, Wang, Zhenhua, Shen, Yi, Xie, Lihua

    Published 2023
    “…Two approaches, namely, projection and polytopic conversion, are presented to check the intersection situation. The detection performance is quantified using a stealthy attack set and the corresponding state estimation error set. …”
    Get full text
    Journal Article
  5. 185

    Petri net-based efficient determination of optimal schedules for transport-dominant single-arm multi-cluster tools by Yang, Fajun, Wu, Naiqi, Qiao, Yan, Zhou, Mengchu, Su, Rong., Qu, Ting

    Published 2018
    “…Thereafter, an efficient algorithm is developed to check the given conditions and find such a schedule efficiently if existing. …”
    Get full text
    Get full text
    Journal Article
  6. 186

    HFP 303E - Asian Thought: Indian, Chinese, And Japanese June 2016 by PPIK, Pusat Pengajian Ilmu Kemanusiaan

    Published 2016
    “…Please check that this examination paper consists of FOUR pages of printed material before you begin the examination. …”
    Get full text
    Teaching Resource
  7. 187

    Development of software testing and analysis tools : Part A by Ng, Qing Xiang.

    Published 2009
    “…The patterns are: • Identical/Compliment-Decision Pattern • Mutually-Exclusive-Decision Pattern • Check-then-Do Pattern • Loop-by-Flag Pattern The scope of this project is to create a set of tools to facilitate detecting of such infeasible paths by detecting the conditions that fulfill the patterns mentioned above. …”
    Get full text
    Final Year Project (FYP)
  8. 188

    The application of microtremor survey method in investigating the geological formation of Singapore by Muhammad Azri Bin Omar.

    Published 2011
    “…A comparison between the results obtained from SPAC analysis as well as borehole information will also be shown to check for consistency.…”
    Get full text
    Final Year Project (FYP)
  9. 189

    Recommendation in location based social networks by Chen, Long.

    Published 2013
    “…Temporal information in check-ins which interconnects users and point-of-interests have significant value in LBSNs. …”
    Get full text
    Final Year Project (FYP)
  10. 190

    Design and development of a robot invigilator by Wu, Xiangran.

    Published 2013
    “…By applying this technology, the robot invigilator can do what a traditional invigilator need to do during an examination such like, timing for the duration, checking the attendance face-to-face. A backend exam registration system also has been developed to simulate the real case. …”
    Get full text
    Final Year Project (FYP)
  11. 191

    Target detection in stationary background by Liu, Lu.

    Published 2013
    “…The basic principle of target detection is to compare the current image with a reference image which is call the background image, from the comparison result to define whether there is a moving target in the image by checking the changing in the image, pixel by pixel. …”
    Get full text
    Final Year Project (FYP)
  12. 192

    Report on industrial attachment with Autodesk Asia Private Limited by Zhu, Chenyang

    Published 2015
    “…Few projects were undertaken during the internship at Autodesk including porting Memento to Mac OS X, add check video update functionality to Memento, Mesh Segmentation using OpenCL and design and implementation of Large Mesh Web Viewer. …”
    Get full text
    Final Year Project (FYP)
  13. 193

    Investigating growth and properties of perovskite single crystals by Tan, Kok Ho

    Published 2018
    “…X-ray diffraction was conducted to check the purity of methylammonium lead bromide perovskite crystals grown. …”
    Get full text
    Final Year Project (FYP)
  14. 194

    Symbolic verification and strategy synthesis for turn-based stochastic games by Kwiatkowska, M, Norman, G, Parker, D, Santos, G

    Published 2022
    “…Probabilistic model checking techniques for this class of models allow us to formally specify quantitative specifications of either collective or individual behaviour and then automatically synthesise strategies for the agents under which these specifications are guaranteed to be satisfied. …”
    Book section
  15. 195

    Blind recognition of LDPC code parameters over erroneous channel conditions by Ramabadran, Swaminathan, Madhukumar, A. S., Wang, Guohua, Ting, Shang Kee

    Published 2020
    “…In this study, blind estimation algorithms are proposed to identify code dimension and codeword length parameters of low-density parity-check (LDPC) codes at the receiver over noisy or erroneous channel conditions assuming a non-cooperative scenario. …”
    Get full text
    Journal Article
  16. 196

    Multi-objectives firefly algorithm for task offloading in the edge-fog-cloud computing by A. Saif, Faten, Latip, Rohaya, Mohd Hanapi, Zurina, Kamarudin, Shafinah, Senthil Kumar, A.V., Salem Bajaher, Awadh

    Published 2024
    “…Additionally, it verifies the status of the server (on/off) before offloading; if the server is unavailable, the algorithm proceeds to check the next layer. In the second stage, the strategy employs a Multi-objective Firefly (MFA) algorithm to assign the optimal computational device within the selected layer. …”
    Get full text
    Article
  17. 197

    HKB312E - Selected Texts from European and American Literature [Karya-Karya Terpilih daripada Kesusasteraan Eropah dan Amerika] June 2019 by PPIK, Pusat Pengajian Ilmu Kemanusiaan

    Published 2019
    “…Second Semester Examination 2018/2019 Academic Session June 2019 HKB312E -Selected Texts from European and American Literature [Karya-Karya Terpilih daripada Kesusasteraan Eropah dan Amerika] Duration : 3 hours [Masa : 3 jam] Please check that this examination paper consists of SIX (6) pages of printed material before you begin the examination. …”
    Get full text
    Teaching Resource
  18. 198

    SDR4ALL based radar demonstration (Part 1) by Hu, Xudong.

    Published 2011
    “…In this report, process of building and the test data of the system are provided, after checking by the experiment outside, future recommendation has also been proposed.…”
    Get full text
    Final Year Project (FYP)
  19. 199

    Preprocessing and authentication of 2D barcodes by Chen, Changsheng.

    Published 2013
    “…In this thesis, we investigate the detection step of a barcode by modeling its finder pattern as a 2D signal with finite rate of innovations and reconstructing it through block by block operation. Then, a quality checking step of the barcode images is added to reject those poor quality images for saving the time in processing the undecodable images and avoiding wrongly decoded information. …”
    Get full text
    Thesis
  20. 200

    A study of periodic behaviors by Doan Manh, Hiep

    Published 2014
    “…It is our belief that the model is directly applicable in mining periodic behaviors for moving users of telecommunication companies with their GPS data or moving users of location-based social networks with their check-in data.…”
    Get full text
    Final Year Project (FYP)