Showing 181 - 200 results of 7,547 for search '(peers OR ((cheer OR cher) OR (cheers OR ((chers OR chens) OR (chenan OR chengyan)))))*', query time: 0.22s Refine Results
  1. 181

    Bombs away. by Tong, Junwei.

    Published 2012
    “…Bombs Away is a 3D animated short film produced by Junwei Tong, Kenneth Chen and Gabriel Yeong. It is about an army commander who takes up painting, seeking solace from the ravages of war.…”
    Get full text
    Final Year Project (FYP)
  2. 182

    A two sample size estimator for large data sets by O'Connell, M, Smith, HW, Thomassen, Ø

    Published 2025
    “…As an alternative, we show how the asymptotically efficient CEP-GMM estimator of Chen et al. (2005) and Chen et al. (2008) can also be used to reduce computational cost in our setting. …”
    Journal article
  3. 183

    The new Chinese women by Seah, Pei Jun

    Published 2015
    “…This paper will thus argue that both Chen Ran and Yan Geling both portray the stereotypical female sexuality as well as alternatives of it. …”
    Get full text
    Final Year Project (FYP)
  4. 184

    That mysterious man by Lin, Enyi

    Published 2024
    “…Xu An reports to his captain Chen Yi. Xu An's main mission is to find clues on Zhang Xu's daily actions in Tang Nightclub. …”
    Get full text
    Thesis-Master by Coursework
  5. 185

    Design and comparative analysis of different pricing mechanisms and energy allocation policies for energy trading by Lim, Jerand Ze Hui

    Published 2022
    “…As a result, the dependency on fossil fuels, natural gas, and coals to produce electricity will be minimized. Peer-to-peer (P2P) energy trading has been proposed as a solution to this problem. …”
    Get full text
    Final Year Project (FYP)
  6. 186

    Solving combinatorial optimization problems using augmented lagrange chaotic simulated annealing by Wang, Lipo., Tian, Fuyu, Soong, Boon Hee, Wan, Chunru

    Published 2012
    “…Chaotic simulated annealing (CSA) proposed by Chen and Aihara has been successfully used to solve a variety of combinatorial optimization problems. …”
    Get full text
    Get full text
    Journal Article
  7. 187

    Distributed discovery of network resources in p2p systems by Yap, Teck Min.

    Published 2010
    “…Peer-to-Peer (P2P) network system which is a distributed system are getting famous in recent years and hence those P2P applications are broadly used in file sharing and transferring such as Gnutella, BitTorrent, uTorrent, BitComet and FlashTrack. …”
    Get full text
    Final Year Project (FYP)
  8. 188

    Access structures of elliptic secret sharing schemes by Chen, Hao, Ling, San, Xing, Chaoping

    Published 2013
    “…It is a central problem in secret sharing to understand the access structures of secret sharing schemes. In Chen and Kramer, secret sharing schemes from algebraic-geometric codes and their applications in secure multiparty computation were proposed and studied. …”
    Get full text
    Get full text
    Journal Article
  9. 189

    0-1 Knapsack in Nearly Quadratic Time by Jin, Ce

    Published 2024
    “…On the upper bound side, currently the fastest algorithm runs in 𝑂e(𝑛 + 𝑤 12/5 max ) time (Chen, Lian, Mao, and Zhang 2023), improving the earlier 𝑂(𝑛 + 𝑤 3 max)-time algorithm by Polak, Rohwedder, and Węgrzycki (2021). …”
    Get full text
    Article
  10. 190

    Moonchild. by Chan, Yin Wan., Chong, Sara Shuzhen.

    Published 2009
    “…Being the product of an extremely close collaboration with my partner Chen Yanyun, we will most probably have different yet similar experiences expressed in each of our papers. …”
    Get full text
    Final Year Project (FYP)
  11. 191

    Chatalone : crowd chat application by How, Yi De

    Published 2021
    “…This project aims to develop a cross-platform mobile-based messaging application that will allow users to chat with other users anonymously in a local area, through a peer-to-peer mesh network, without requiring internet or mobile network coverage.…”
    Get full text
    Final Year Project (FYP)
  12. 192

    Microfluidic Platform for Investigating Prostate Cancer Metastasis by Ng, Wei Kai

    Published 2017
    “…Objective: To develop a microfluidic model of bone metastasis. [1st Award]-[Peer Assessment Review]…”
    Get full text
    Get full text
    Student Research Poster
  13. 193

    Multi-chain energy trading In blockchain-based microgrids with notary schemes by Nathanael Axel Wibisono

    Published 2024
    “…By integrating blockchain technology, Blockchain-based Microgrids (BBMs) employ a secure, transparent ledger system to streamline peer-to-peer energy exchanges within these networks. …”
    Get full text
    Final Year Project (FYP)
  14. 194

    Security in mobile ad hoc networks by Choy, Sok Sien.

    Published 2008
    “…Mobile Ad Hoc Networks, or MANETs, have recently gained much attention in the research community in anticipation of pertinent applications in converging communications services. The proliferation of peer-to-peer products has rendered MANET security an imminent issue. …”
    Get full text
    Thesis
  15. 195

    New optimal asymmetric quantum codes from constacyclic codes by Guanghui, Zhang, Bocong, Chen, Liangchen, Li

    Published 2014
    “…The first class is the asymmetric quantum codes with parameters [[q2 + 1, q2 + 1 - 2(t + k + 1), (2k + 2)/(2t + 2)]]q2 where q is an odd prime power, t, k are integers with , which is a generalization of [J. Chen, J. Li and J. Lin, Int. J. Theor. Phys. 53 (2014) 72, Theorem 2] in the sense that we do not assume that q ≡1 (mod 4). …”
    Get full text
    Get full text
    Journal Article
  16. 196

    Associations between violence in childhood, depression and suicide attempts in adolescence: evidence from a cohort study in Luwero district, Uganda by Akunzirwe, R, Carter, DJ, Hanna, L, Zinke-Allmang, A, Akim, A, Datzberger, S, Parkes, J, Knight, L, Atuhaire, L, Nakuti, J, Mirembe, A, Allen, E, Naker, D, Devries, K, Bhatia, A

    Published 2024
    “…However, few studies use longitudinal data from low- and middle-income countries with attention to how associations differ by experiencing specific types of violence or alongside different contexts of peer and family support. In this study, we quantify the association between experiences of violence in early adolescence and depression and suicide attempts in late adolescence and explore whether this association is modified by family and peer connectedness. …”
    Journal article
  17. 197

    Highlights from Faraday Discussion 172: Carbon in electrochemistry, Sheffield, UK, July 2014 by Dyatkin, B, Ash, PA, Sharma, S

    Published 2015
    “…All discussions form part of the peer review process and are sequentially recorded and published with the accepted manuscripts.…”
    Conference item
  18. 198

    Network architecture for large-scale CVE by Jiang, Bo Hong

    Published 2008
    “…A hybrid client-server with peer-to-peer audio/video communication network architecture is then proposed and implemented to address the issue of potential server bottleneck. …”
    Get full text
    Thesis
  19. 199

    Topical and transdermal botanical formulations of the Chinese pharmacopoeia—a review by Gu, Jingyi, Lane, Majella E., Sil dos Santos, Bruno, Heinrich, Michael

    Published 2024
    “…The use of botanical materials in TCM formulations is guided by the “Jun‐Chen‐Zuo‐Shi” principle rooted in Yin‐Yang and the five elements' theories. …”
    Get full text
    Article
  20. 200

    Poisson discretizations of Wiener functionals and Malliavin operators with Wasserstein estimates by Privault, Nicolas, Yam, Phillip S. C., Zhang, Zheng

    Published 2021
    “…In addition, we derive a convergence rate of O(λ ) for the Poisson discretization of Wiener functionals by combining the multivariate Chen–Stein method with the Malliavin calculus. Our proposed sufficient condition for establishing the mentioned convergence rate involves the kernel functions in the Wiener chaos, yet we provide examples, especially the discretization of some common path dependent Wiener functionals, to which our results apply without committing the explicit computations of such kernels. …”
    Get full text
    Journal Article