Showing 1 - 20 results of 2,919 for search '"(mice OR (mic OR amic)) (tech" OR (bunch" OR each"))', query time: 0.13s Refine Results
  1. 1
  2. 2
  3. 3

    "Here's looking at you, kid." Detecting people looking at each other in videos by Marín-Jiménez, MJ, Zisserman, A, Ferrari, V

    Published 2011
    “…The objective of this work is to determine if people are interacting in TV video by detecting whether they are looking at each other or not. We determine both the temporal period of the interaction and also spatially localize the relevant people. …”
    Conference item
  4. 4
  5. 5

    Dna markers and mapping of quantitative trait loci for yield and bunch quality in Deli dura X Yangambi pisifera oil palm (Elaeis guineensis) population by Seng, Tzer Ying

    Published 2015
    “…In the DA41 population, cumulative QTL effects increased in tandem with the number of QTL markers, matching the QT+ allele for each of the traits tested. The many QTLs detected per trait suggested that the traits studied are polygenic with many genes of individual small effects on independent loci. …”
    Get full text
    Thesis
  6. 6

    Luminosity determination in pp collisions at  √𝑠 = 7 TeV using the ATLAS detector at the LHC by Aad, G., Abbott, B., Abdallah, J., Abdelalim, A. A., Abdesselam, A., Abdinov, O., Abi, B., Abolins, M., Abramowicz, H., Abreu, H., Acerbi, E., Acharya, B. S., Ackers, M., Adams, D. L., Addy, T. N., Adelman, J., Aderholz, M., Adomeit, S., Adragna, P., Adye, T.

    Published 2024
    “…The luminosity is independently determined using several detectors and multiple algorithms, each having different acceptances, systematic uncertainties and sensitivity to background. …”
    Get full text
    Article
  7. 7

    Mathematical foundation of data science by Fang, Xiaowei

    Published 2020
    “…The problems are self-contained, presented prior to each solution.…”
    Get full text
    Final Year Project (FYP)
  8. 8
  9. 9

    Crushing of patterned shells by Lim, Tariene Zi Yi.

    Published 2012
    “…Under quasi-static axial loading, a conventional square tube folds into six sections. Thus, each square tube was divided into six sections, and one pattern will be cut on each section of the tube, on each side of the square. …”
    Get full text
    Final Year Project (FYP)
  10. 10

    Control system development of an autonomous surface vehicle by Chia, Jonathan Mien Hong

    Published 2014
    “…During the selection of each module, the author is to also understand the working principle behind each component to gain better insight on how the component could be implemented on the autonomous surface vehicle and come out with an overall system block diagram.After the selection of each component, the author begins to test the component. …”
    Get full text
    Final Year Project (FYP)
  11. 11

    P2P energy trading among isolated microgrids in the remote area by Huang, Rui

    Published 2021
    “…Combining with the emission standard of carbon allowance, the incentive mechanism of each MG is set to improve the robustness of the model and the rationality of each MG while trading. …”
    Get full text
    Thesis-Master by Coursework
  12. 12

    A study on mental health discussion through Reddit by Nur Shazwani, Kamarudin, Beigi, Ghazaleh, Liu, Huan

    Published 2021
    “…We report linguistic analysis in order to understand the similarity and differences of each mental health community. We first study the sentiment per each Reddit community and followed by the topic modeling. …”
    Get full text
    Conference or Workshop Item
  13. 13

    Time series anomaly detection by Lek, Jie Kai

    Published 2024
    “…The time series dataset consists of multiple sensor readings of each engine and the Remaining Useful Life (RUL) of each engine at each point in time. …”
    Get full text
    Final Year Project (FYP)
  14. 14

    Two-stage nested simulation of tail risk measurement: a likelihood ratio approach by Dang, Ou, Feng, Mingbin, Hardy, Mary R.

    Published 2023
    “…In each of the two stages, the method re-uses the same set of inner level simulation paths for each outer scenario at each time point, using a likelihood ratio method to re-weight the probabilities of each individual path for the different outer scenarios. …”
    Get full text
    Journal Article
  15. 15

    Mobile augmented reality for Bukit Brown cemetery navigation by Newton, Owen Noel, Deshan, Chamika, Nakatsu, Ryohei, Pang, Natalie

    Published 2013
    “…Natural feature tracking is used to recognize each tombstone to eliminate the need of physical modifications to each grave. …”
    Get full text
    Get full text
    Conference Paper
  16. 16

    Image stitching by Chen, Wei Qiang.

    Published 2011
    “…The magnitudes of gradient and orientations are added to each keypoint before creating each keypoint descriptor.These correspondences are then used to find m candidate matching images for each image. …”
    Get full text
    Final Year Project (FYP)
  17. 17
  18. 18

    PandoraHearts : Caucus Race, by Shinobu Wakamiya, author 655895, Jun Mochizuki, illustrator 655896

    Published 2015
    “…Within these pages, four fairy tales unfold, each peering into one of the houses of the four great dukedoms: Vessalius, Rainsworth, Barma, and Nightray. …”
    Get full text
    software, multimedia
  19. 19

    Measurement sensitivity characteristics investigation of an optical fiber sagnac interferometer through strain sensing by Teo, Hwee Fang

    Published 2014
    “…Several sets of OFSIs were configured and strain sensing was carried out to determine the sensitivity characteristics of each OFSI. Experimental data of each experiment were stored in a portable storage device and stringently analyzed through the plotting of graphs using the data points generated. …”
    Get full text
    Final Year Project (FYP)
  20. 20

    Framework of countermeasures (see: Anjuli Shere DPhil thesis, Chapter 8) by Shere, A R K

    Published 2023
    “…The framework is structured with recommended countermeasures at its centre. Each recommendation has noted disadvantages, and is matched to relevant threats that it addresses, followed by an assessment of the function of the countermeasure. …”
    Dataset