Showing 21 - 40 results of 2,919 for search '"(mice OR mic) (lech" OR (leach" OR each"))', query time: 0.12s Refine Results
  1. 21

    Using particle swarm optimization techniques for solving multi-mode resource-constrained project scheduling problem by Chandrasekaran, Hari Haran.

    Published 2011
    “…Each mode represents the combination of different resources and duration. …”
    Get full text
    Final Year Project (FYP)
  2. 22

    Ghost Stories / by Poe, Edgar Allan, 1809-1849, author 324196, James, M. R., 1862-1936, (Montague Rhodes), 242996

    Published 1982
    “…Twenty-two exciting stories from the twilight world of haunted houses and hair-raising spectres are contained in this spine-chilling anthology. Each tale is illustrated with specially commissioned drawings.…”
    text
  3. 23

    Company Law / by Siti Salwa Jaafar, author 629008, Marliana Jamaluddin, author 629009

    Published 2018
    “…It covers the relevant topics in corporation law within seven chapters and is structured based on the company law syllabus in Malaysian polytechnics. Each chapter opens with Learning Outcomes and at the end of each chapter, students are provided with a summary, a list of key terms, and structured and discussion questions. …”
    text
  4. 24

    Vision-based multi-agent cooperative target search by Hu, Jinwen, Xie, Lihua, Xu, Jun

    Published 2013
    “…By dividing the whole surveillance region into cells, a probability map can be formed for each UAV indicating the probability of target existence within each cell. …”
    Get full text
    Get full text
    Conference Paper
  5. 25

    Hierarchical feature attention with bottleneck attention modules for multi-branch classification by Gan, Ryan

    Published 2024
    “…By employing separate feature branches tailored to each task and applying BAM after each branch, the model learns more discriminative features for each hierarchy. …”
    Get full text
    Final Year Project (FYP)
  6. 26

    Energy management in a smart DC grid by Goh, Guo Wei.

    Published 2011
    “…In a battery stack, it is essential for each cell to be of the same state of charge (SoC) level to prevent cell mismatch and prolong battery life. …”
    Get full text
    Final Year Project (FYP)
  7. 27

    PYTHON CRASH COURSE : A HANDS-ON, PROJECT-BASED INTRODUCTION TO PROGRAMMING / by Matthes, Eric, author 655432

    Published [202
    “…Practice exercises come with each topic. The end goal is the creation of a Space Invaders-inspired arcade game to deploy online.…”
    text
  8. 28

    Numerical Methods for Engineers / by Chapra, Steven C., author 289854, Canale, Raymond P., author 234599

    Published 2006
    “…Each part closes with an Epilogue containing sections called "Trade-Offs", "Important Relationships and Formulas", and "Advanced Methods and Additional References". …”
    text
  9. 29

    Opinion formation in social networks with groups: a simulation study by Chiam, Yuan Qi

    Published 2023
    “…Complex network has many different types of networks like random network and scale-free network and each of these networks have their unique behaviours and characteristics. …”
    Get full text
    Final Year Project (FYP)
  10. 30

    Task allocation and scheduling for distributed job execution by Guan, Yitong

    Published 2022
    “…To schedule the jobs, we need to determine the processing locations for the tasks of each job and the execution order of the tasks at each location. …”
    Get full text
    Thesis-Doctor of Philosophy
  11. 31

    SWARM communication - scalability and resiliency by Tao, Zhengyi

    Published 2023
    “…SWARM nodes connect wirelessly to each other, coordinating communication and sensing. …”
    Get full text
    Thesis-Master by Coursework
  12. 32

    Computer information management system in heterogeneous environments : newspaper printing press by Koo, Willie Wee Lin.

    Published 2008
    “…Due to the physical separation of each section, it is difficult to analyze the overall information of the manufacturing flow.…”
    Get full text
    Thesis
  13. 33

    A privacy-preserving diffusion strategy over multitask networks by Wang, Chengcheng, Tay, Wee Peng, Wang, Yuan, Wei, Ye

    Published 2020
    “…In the proposed strategy, at each time instant, each agent sends a noisy estimate, which is its local intermediate estimate corrupted by a zero-mean additive noise, to its neighboring agents. …”
    Get full text
    Conference Paper
  14. 34

    Distributed algorithms for computing a fixed point of multi-agent nonexpansive operators by Li, Xiuxian, Xie, Lihua

    Published 2021
    “…This paper investigates the problem of finding a fixed point for a global nonexpansive operator under time-varying communication graphs in real Hilbert spaces, where the global operator is separable and composed of an aggregate sum of local nonexpansive operators. Each local operator is only privately accessible to each agent, and all agents constitute a network. …”
    Get full text
    Journal Article
  15. 35

    Hi dad, welcome to Facebook : how the intimacy of a parent-child relationship is affected when both are users of Facebook. by Goh, Tiffany Shimin., Lee, Weiyi.

    Published 2009
    “…It also examines how Facebook would influence the way both parent and child interact with each other. 17 parent-child pairs were interviewed. …”
    Get full text
    Final Year Project (FYP)
  16. 36

    On the hidden layer-to-layer topology of the representations of reality realised within neural networks by Gafvert, O, Grindrod, P, Harrington, HA, Higham, CF, Higham, DJ, Yim, KM

    Published 2025
    “…The possible activation state within each layer can be represented as a cube within Euclidean space of a high dimension (e.g. equal to the number of artificial neurons at that level). …”
    Journal article
  17. 37
  18. 38

    Near-field dynamics of parallel twin jets in cross-flow by Zang, Bin, New, Tze How

    Published 2017
    “…Cross-stream results indicate that the pair of inner vortices associated with the two resulting CVPs is being induced to move towards each other along the symmetry plane, where their opposite-signed vorticities annihilate with each other eventually. …”
    Get full text
    Get full text
    Journal Article
  19. 39

    Information fusion and cooperative control for target search and localization in multi-agent sensor networks by Hu, Jinwen

    Published 2013
    “…Each agent keeps an individual probability map and updates the map individually with measurements according to Bayesian rule. …”
    Get full text
    Thesis
  20. 40

    Logistics coordination in vendor-buyer systems by Wang, Ye Xin

    Published 2008
    “…In the meanwhile, information technology and outsourcing have enabled companies to successfully operate a collaborative supply chain, in which each logistics participant focuses on only a few key strategic activities. …”
    Get full text
    Thesis