All Outputs (1204)
Martin Amis (Writers and Their Work) (2015)
Book
Applications of Poisson-Hidden Markov Model (2015)
Journal Article
Some real discrete time-series counts can be considered as the random variables which follow Poisson distribution governed by Hidden Markov Chain. In this paper, a Poisson-Hidden Markov Model is employed to capture the switching between two states in... Read More about Applications of Poisson-Hidden Markov Model.
Major Bleeding and Adverse Outcome following Percutaneous Coronary Intervention (2015)
Journal Article
Advances in anti-thrombotic and anti-platelet therapies have improved outcomes in patients undergoing percutaneous coronary interventions (PCIs) through a reduction in ischaemic events, at the expense of peri-procedural bleeding complications. These... Read More about Major Bleeding and Adverse Outcome following Percutaneous Coronary Intervention.
The use of plots in orthopaedic literature (2015)
Journal Article
A cognitive procedure for representation change in verbal insight problems. (2015)
Journal Article
The aim of this study was to develop a novel cognitive procedure for operationalizing how there-encoding and constraint relaxation, suggested by representational change theory (RCT) (Ohlsson,1992,2011), can effect representational change in verbal in... Read More about A cognitive procedure for representation change in verbal insight problems..
Respiratory symptoms and cross-shift lung function in relation to cotton dust and endotoxin exposure in textile workers in Nepal: a cross-sectional study (2015)
Journal Article
Objectives: Inhalation of a cotton-based particulates has previously been associated with respiratory symptoms and impaired lung function. This study investigates the respiratory health of Nepalese textile workers in relation to dust and endotoxin ex... Read More about Respiratory symptoms and cross-shift lung function in relation to cotton dust and endotoxin exposure in textile workers in Nepal: a cross-sectional study.
Verführung, Hingabe, Auftrag: Hypnose und Verbrechen in Deutschland nach dem Ersten Weltkrieg (2015)
Journal Article
Bereits die ersten Reaktionen auf den Mesmerismus zeugten von einem binären Denken, das Kontrolle und Kontrollverlust geschlechter- und klassenspezifisch interpretierte, sodass ein weit verbreitetes Bild entstehen konnte von bürgerlichen Hypnotiseure... Read More about Verführung, Hingabe, Auftrag: Hypnose und Verbrechen in Deutschland nach dem Ersten Weltkrieg.
Temporal crowding and its interplay with spatial crowding (2015)
Journal Article
The Population of White Dwarf Binaries with Hot Subdwarf Companions (2015)
Journal Article
PASSIVE INSTABILITY CONTROL BY USING A HEAT EXCHANGER AS ACOUSTIC SINK (2015)
Conference Proceeding
MEASUREMENT OF THE FLAME DESCRIBING FUNCTION IN COMBUSTORS WITHOUT OPTICAL ACCESS (2015)
Conference Proceeding
DUST in Nearby Galaxies with Spitzer (DUSTINGS): An Infrared Census of Extreme AGB Stars in Nearby Dwarf Galaxies (2015)
Conference Proceeding
Nearby resolved dwarf galaxies provide excellent opportunities for studying the dust-producing late stages of stellar evolution. DUSTiNGS (DUST in Nearby Galaxies with Spitzer) is a 3.6- and 4.5-μm imaging survey of 50 dwarf galaxies within 1.5 Mpc.... Read More about DUST in Nearby Galaxies with Spitzer (DUSTINGS): An Infrared Census of Extreme AGB Stars in Nearby Dwarf Galaxies.
Detecting Long Period Variables in M 33 Using UKIRT-WFCAM Images (2015)
Conference Proceeding
We have used the UK InfraRed Telescope (UKIRT) to conduct a near-IR monitoring campaign to search for variable stars in the Local Group spiral galaxy M 33. Most of the 4643 detected variables appear to be Asymptotic Giant Branch (AGB) stars.
Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment (2015)
Conference Proceeding
In a Multiple Cloud Collaborative Environment (MCCE), cloud users and cloud providers interact with each other via a brokering service to request and provision cloud services. The brokering service considers several pieces of data to broker the best... Read More about Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment.
BYOD NETWORK: Enhancing Security through Trust–Aided Access Control Mechanisms (2015)
Journal Article