-
101
3D object recognition using invariance
Published 1995“…These invariant measurements can be used to index a library of object models for recognition and provide a principled basis for the other stages of the recognition process such as feature grouping and hypothesis verification. Object models can be acquired directly from images, allowing efficient construction of model libraries without manual intervention.…”
Journal article -
102
Object retrieval with large vocabularies and fast spatial matching
Published 2007“…To further improve query performance, we add an efficient spatial verification stage to re-rank the results returned from our bag-of-words model and show that this consistently improves search quality, though by less of a margin when the visual vocabulary is large. …”
Conference item -
103
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
Article -
104
A proposed framework of job resources influencing work engagement towards academics of public universities in Beijing and Shanghai in China
Published 2024“…Over the past, work engagement underwent a rigorous verification process in different occupational background. …”
Get full text
Article -
105
Secure and secret cooperation in robotic swarms
Published 2021“…In other words, data verification can be separated from data itself. We propose a system where robots in a swarm, to cooperate towards mission completion, have to "prove" their integrity to their peers by exchanging cryptographic proofs. …”
Get full text
Get full text
Article -
106
Secure and secret cooperation in robot swarms
Published 2021“…In other words, data verification can be separated from data itself. We propose a system where robots in a swarm, to cooperate toward mission completion, have to “prove” their integrity to their peers by exchanging cryptographic proofs. …”
Get full text
Article -
107
-
108
Influence of no-core fiber on the focusing performance of an ultra-small gradient-index fiber probe
Published 2020“…By taking the variable relationship between the focusing performance (including the working distance and the focusing spot size) of the probe and the length of the no-core fiber as the criterion, the effective beam expansion length of the no-core fiber in the ultra-small gradient-index fiber probe is calculated based on the basic properties of the Gaussian beam. Verification and analysis are done by numerical calculations and experimental measurements, respectively. …”
Get full text
Journal Article -
109
Electrochemical impedance analysis of thermogalvanic cells
Published 2022“…We first propose the detailed impedance model followed experimental verification on three types of electrode materials. Parameters including kinetic rate constants and ion diffusion coefficients for the electrodes are obtained by fitting the impedance data. …”
Get full text
Journal Article -
110
Forgery localization in images
Published 2023“…Due to the increase in popularity for forgeries in images, verification of authenticity in images techniques are required. …”
Get full text
Final Year Project (FYP) -
111
Design and analysis of multiple degree-of-freedom electrical machines with helical motion
Published 2024“…Finally, a prototype has been manufactured for verification in practical scenario.…”
Get full text
Thesis-Doctor of Philosophy -
112
Simulation and visualisation of perching manoeuvres
Published 2011“…Visualisation of the manoeuvre provided visual verification of a successful perching manoeuvre, while at the same time allowing the user to see any problems in the manoeuvre that may not be evident from the plotted results.…”
Get full text
Final Year Project (FYP) -
113
Discovery of stabilized functional mutants of human aquaporin 1
Published 2016“…. ~ 5% of mutants from a total of 2816 screened from thirty-three 96-well plates were identified after a series of initial and verification screens. In future, we hope to characterize these mutants for increased stability as they may be useful in structural studies, drug discovery in human cancers related to AQP1 overexpression as well as in biotechnological applications, such as water purification, in particular.…”
Get full text
Final Year Project (FYP) -
114
Automatic program repair and synthesis using genetic programming
Published 2017“…When bugs in a program are identified by a debugger or a program verifier, the developer of the program would have to manually interpret the bugs, refine the program, and perform verification for the fix until the program is bug free. …”
Get full text
Final Year Project (FYP) -
115
Identification of alternative-splicing events in human monocyte differentiation
Published 2018“…The data obtained from RNA-seq still required verification through traditional methods, such as RT-PCR. …”
Get full text
Final Year Project (FYP) -
116
16.358J / 16.863J System Safety, Spring 2005
Published 2005“…Topics covered include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. …”
Get full text
Learning Object -
117
Game theoretical security detection strategy for networked systems
Published 2020“…Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. …”
Get full text
Journal Article -
118
DDA based grouting prediction and linkage between fracture aperture distribution and grouting characteristics
Published 2021“…The observed agreement can be treated as an indirect verification of the robustness of our proposed grouting module. …”
Get full text
Journal Article -
119
Protecting FPGA design with elliptic curve cryptography
Published 2014“…This report discusses the complete FPGA design process, including architectural design, scheduling, Verilog coding, simulation and on-board verification.…”
Get full text
Final Year Project (FYP) -
120
Investigation and enhancement of viola jones face detection algorithm performance using contrast-limited adaptive histogram equalization
Published 2015“…Face detection is the first and the most important steps to the entire face analysis algorithms, including face alignment, face relighting, face modeling, face recognition, head pose tracking, face verification/authentication, facial expression tracking/recognition, gender or age recognition, and many more. [1] While this sound like a simple task for humans, it is still an extremely challenging task for computers. …”
Get full text
Final Year Project (FYP)