Search alternatives:
spans » scans (Expand Search), spins (Expand Search), pans (Expand Search), sans (Expand Search)
piaa » aiaa (Expand Search), paa (Expand Search), pina (Expand Search)
bina » bin (Expand Search)
bing » ming (Expand Search), ying (Expand Search), ting (Expand Search)
pine » spine (Expand Search), line (Expand Search), fine (Expand Search)
pin » spin (Expand Search)
ping » sping (Expand Search), ming (Expand Search), peng (Expand Search), ying (Expand Search)
span » spin (Expand Search), pan (Expand Search), san (Expand Search)
ling » long (Expand Search), line (Expand Search), link (Expand Search)
spans » scans (Expand Search), spins (Expand Search), pans (Expand Search), sans (Expand Search)
piaa » aiaa (Expand Search), paa (Expand Search), pina (Expand Search)
bina » bin (Expand Search)
bing » ming (Expand Search), ying (Expand Search), ting (Expand Search)
pine » spine (Expand Search), line (Expand Search), fine (Expand Search)
pin » spin (Expand Search)
ping » sping (Expand Search), ming (Expand Search), peng (Expand Search), ying (Expand Search)
span » spin (Expand Search), pan (Expand Search), san (Expand Search)
ling » long (Expand Search), line (Expand Search), link (Expand Search)
-
2301
Development of a system to detect hidden information in a document using steganography software
Published 2018“…This report documents the steps and development process of a software system that implements a signature-based steganalysis approach based on Patterns of Pixel Differences and Random Embedding. Like other blind steganalysis attempts, there will be inherent uncertainties and does not guarantee 100% detection rates. …”
Get full text
Final Year Project (FYP) -
2302
Smart LED lighting
Published 2018“…The App will have features like manual lighting control, system status display and power saving mode. …”
Get full text
Final Year Project (FYP) -
2303
Hydrothermal preparation of carbon nanosheets and their supercapacitive behavior
Published 2013“…Deflated-balloon-like and crumpled carbon nanosheets were prepared via a low-temperature hydrothermal carbonization of glucose at the two-phase interfaces. …”
Get full text
Get full text
Journal Article -
2304
Performance analysis for continuous antennas in Rician channels
Published 2024“…Improved spectral efficiency resulting from more antenna elements has motivated the idea of packing very large numbers of elements in an array, yielding continuous like antennas. This paper conducts a performance analysis of continuous antennas, employing matched filtering. …”
Journal article -
2305
Violence risk assessment using the Oxford Mental Illness and Violence Tool
Published 2024“…</li> <li>Traditional risk assessment tools are being replaced by novel tools like OxMIV, which provide probability scores for better clinical assessments.…”
Journal article -
2306
Wrapped branes and punctured horizons
Published 2020“…We show that some singular solutions of the Liouville equation have a physical interpretation as explicit point-like brane sources on the Riemann surface. We uncover the details of this picture by focusing on $\mathcal{N}$ = 1 theories of class $\mathcal{S}$ arising from M5-branes on a punctured Riemann surface. …”
Journal article -
2307
Wrapped branes and punctured horizons
Published 2019“…We show that some singular solutions of the Liouville equation have a physical interpretation as explicit point-like brane sources on the Riemann surface. We uncover the details of this picture by focusing on $\mathcal{N}$ = 1 theories of class $\mathcal{S}$ arising from M5-branes on a punctured Riemann surface. …”
Internet publication -
2308
New approach to obtain height measurements from video
Published 1999“…A height measurement is obtained from each frame of the video. A `stereo like' correspondence between images is not required. …”
Conference item -
2309
The uniqueness trap
Published 2025“…Project managers and planners are highly prone to believing that their projects are one of a kind—partly because those that seem new and distinctive are more likely to win support. But research on 1,300-plus projects reveals that few, if any, actually are unique. …”
Journal article -
2310
A contract negotiation scheme for safety verification of interconnected systems
Published 2024“…In this paper, we show that compositional methods like AGC can mitigate this problem. We formulate the synthesis problem into a set of small-size problems, which constructs local contracts for subsystems, and propose a negotiation scheme among the subsystems at the contract level. …”
Journal article -
2311
Scheduling and resource optimization in rail operations : models and algorithms
Published 2016“…Countries such as China and India have the railway network span over 120,000 and 64,000 track kilometres respectively, and are rapidly expanding their rail network. …”
Get full text
Thesis -
2312
Behaviorally informed digital campaigns and their association with social media engagement and COVID-19 vaccine uptake in Belize
Published 2024“…However, lack of trust in the vaccine and fear of side effects in regions like the Caribbean resulted in a low uptake despite enough vaccine supply. …”
Get full text
Article -
2313
Creative AI : a data-driven design approach for creative online ad optimisation using artificial intelligence and big data
Published 2020“…Through the integration of Artificial Intelligence and Big Data with current industry processes, a new kind of advertising agency will emerge that is run like a tech company. Using Big Data to inform creative design and Artificial Intelligence to identify patterns, predictive analysis can be applied to creative online banner ads for the purpose of increasing user engagement through higher click-through rates. …”
Get full text
Thesis-Master by Research -
2314
Highly stable and efficient planar perovskite solar cells using ternary metal oxide electron transport layers
Published 2021Get full text
Journal Article -
2315
Two sides of the same coin : boons and banes of machine learning in hardware security
Published 2022“…ML schemes have been extensively used to enhance the security and trust of embedded systems like hardware Trojans and malware detection. On the other hand, ML-based approaches have also been adopted by adversaries to assist side-channel attacks, reverse engineer integrated circuits and break hardware security primitives like Physically Unclonable Functions (PUFs). …”
Get full text
Journal Article -
2316
Geometry-mediated bridging drives nonadhesive stripe wound healing
Published 2023Get full text
Journal Article -
2317
Holocene relative sea-level histories of tropical islands
Published 2023“…I demonstrate the utility of coral microatolls to serve as precise indicators of Late Holocene RSL in places like Singapore, where the lack of accommodation space due to RSL fall from GIA has formerly limited the use of sedimentary indicators like mangrove peat. …”
Get full text
Thesis-Doctor of Philosophy -
2318
Referring expression segmentation: from conventional to generalized
Published 2024“…Traditional RES methods usually either use an FCN-like network that directly generates the segmentation mask from the image or first extract all instances using a standalone network and then select the target from targets. …”
Get full text
Thesis-Doctor of Philosophy -
2319
Multi-stage generative adversarial networks for generating pavement crack images
Published 2024Get full text
Journal Article -
2320
PrimeNet: a framework for commonsense knowledge representation and reasoning based on conceptual primitives
Published 2024“…Commonsense knowledge acquisition and representation is a core topic in artificial intelligence (AI), which is crucial for building more sophisticated and human-like AI systems. However, existing commonsense knowledge bases organize facts in an isolated manner like bag of facts, lacking the cognitive-level connections that humans commonly possess. …”
Get full text
Journal Article