Showing 2,301 - 2,320 results of 4,752 for search '(((((spans OR (piaa OR (bina OR bing))) OR pine) OR pin) OR like) OR (span OR (ping OR ling)))', query time: 0.25s Refine Results
  1. 2301

    Development of a system to detect hidden information in a document using steganography software by Wuan, Neng Jie

    Published 2018
    “…This report documents the steps and development process of a software system that implements a signature-based steganalysis approach based on Patterns of Pixel Differences and Random Embedding. Like other blind steganalysis attempts, there will be inherent uncertainties and does not guarantee 100% detection rates. …”
    Get full text
    Final Year Project (FYP)
  2. 2302

    Smart LED lighting by Tan, Wee Beng

    Published 2018
    “…The App will have features like manual lighting control, system status display and power saving mode. …”
    Get full text
    Final Year Project (FYP)
  3. 2303

    Hydrothermal preparation of carbon nanosheets and their supercapacitive behavior by Liu, Mingzhu, Yan, Ya, Zhang, Lan, Wang, Xin, Wang, Cheng

    Published 2013
    “…Deflated-balloon-like and crumpled carbon nanosheets were prepared via a low-temperature hydrothermal carbonization of glucose at the two-phase interfaces. …”
    Get full text
    Get full text
    Journal Article
  4. 2304

    Performance analysis for continuous antennas in Rician channels by Smith, PJ, Khordad, E, Senanayake, R, Coon, JP

    Published 2024
    “…Improved spectral efficiency resulting from more antenna elements has motivated the idea of packing very large numbers of elements in an array, yielding continuous like antennas. This paper conducts a performance analysis of continuous antennas, employing matched filtering. …”
    Journal article
  5. 2305

    Violence risk assessment using the Oxford Mental Illness and Violence Tool by Fazel, S, Scola, G

    Published 2024
    “…</li> <li>Traditional risk assessment tools are being replaced by novel tools like OxMIV, which provide probability scores for better clinical assessments.…”
    Journal article
  6. 2306

    Wrapped branes and punctured horizons by Bobev, N, Bomans, P, Gautason, FF

    Published 2020
    “…We show that some singular solutions of the Liouville equation have a physical interpretation as explicit point-like brane sources on the Riemann surface. We uncover the details of this picture by focusing on $\mathcal{N}$ = 1 theories of class $\mathcal{S}$ arising from M5-branes on a punctured Riemann surface. …”
    Journal article
  7. 2307

    Wrapped branes and punctured horizons by Bobev, N, Bomans, P, Gautason, FF

    Published 2019
    “…We show that some singular solutions of the Liouville equation have a physical interpretation as explicit point-like brane sources on the Riemann surface. We uncover the details of this picture by focusing on $\mathcal{N}$ = 1 theories of class $\mathcal{S}$ arising from M5-branes on a punctured Riemann surface. …”
    Internet publication
  8. 2308

    New approach to obtain height measurements from video by Criminisi, A, Zisserman, A, Van Gool, LJ, Bramble, SK, Compton, D

    Published 1999
    “…A height measurement is obtained from each frame of the video. A `stereo like' correspondence between images is not required. …”
    Conference item
  9. 2309

    The uniqueness trap by Flyvbjerg, B, Budzier, A, Christodoulou, MD, Zottoli, M

    Published 2025
    “…Project managers and planners are highly prone to believing that their projects are one of a kind—partly because those that seem new and distinctive are more likely to win support. But research on 1,300-plus projects reveals that few, if any, actually are unique. …”
    Journal article
  10. 2310

    A contract negotiation scheme for safety verification of interconnected systems by Tan, X, Papachristodoulou, A, Dimarogonas, DV

    Published 2024
    “…In this paper, we show that compositional methods like AGC can mitigate this problem. We formulate the synthesis problem into a set of small-size problems, which constructs local contracts for subsystems, and propose a negotiation scheme among the subsystems at the contract level. …”
    Journal article
  11. 2311

    Scheduling and resource optimization in rail operations : models and algorithms by Birhade, Mahendra Pandharinath

    Published 2016
    “…Countries such as China and India have the railway network span over 120,000 and 64,000 track kilometres respectively, and are rapidly expanding their rail network. …”
    Get full text
    Thesis
  12. 2312

    Behaviorally informed digital campaigns and their association with social media engagement and COVID-19 vaccine uptake in Belize by Daga, Giuliana, Kossuth, Lajos, Boruchowicz, Cynthia, Lopez Boo, Florencia, Largaespada Beer, Natalia

    Published 2024
    “…However, lack of trust in the vaccine and fear of side effects in regions like the Caribbean resulted in a low uptake despite enough vaccine supply. …”
    Get full text
    Article
  13. 2313

    Creative AI : a data-driven design approach for creative online ad optimisation using artificial intelligence and big data by Phay, Han

    Published 2020
    “…Through the integration of Artificial Intelligence and Big Data with current industry processes, a new kind of advertising agency will emerge that is run like a tech company. Using Big Data to inform creative design and Artificial Intelligence to identify patterns, predictive analysis can be applied to creative online banner ads for the purpose of increasing user engagement through higher click-through rates. …”
    Get full text
    Thesis-Master by Research
  14. 2314
  15. 2315

    Two sides of the same coin : boons and banes of machine learning in hardware security by Liu, Wenye, Chang, Chip Hong, Wang, Xueyang, Liu, Chen, Fung, Jason M., Mohammad Ebrahimabadi, Karimi, Naghmeh, Meng, Xingyu, Basu, Kanad

    Published 2022
    “…ML schemes have been extensively used to enhance the security and trust of embedded systems like hardware Trojans and malware detection. On the other hand, ML-based approaches have also been adopted by adversaries to assist side-channel attacks, reverse engineer integrated circuits and break hardware security primitives like Physically Unclonable Functions (PUFs). …”
    Get full text
    Journal Article
  16. 2316
  17. 2317

    Holocene relative sea-level histories of tropical islands by Tan, Fangyi

    Published 2023
    “…I demonstrate the utility of coral microatolls to serve as precise indicators of Late Holocene RSL in places like Singapore, where the lack of accommodation space due to RSL fall from GIA has formerly limited the use of sedimentary indicators like mangrove peat. …”
    Get full text
    Thesis-Doctor of Philosophy
  18. 2318

    Referring expression segmentation: from conventional to generalized by Liu, Chang

    Published 2024
    “…Traditional RES methods usually either use an FCN-like network that directly generates the segmentation mask from the image or first extract all instances using a standalone network and then select the target from targets. …”
    Get full text
    Thesis-Doctor of Philosophy
  19. 2319
  20. 2320

    PrimeNet: a framework for commonsense knowledge representation and reasoning based on conceptual primitives by Liu, Qian, Han, Sooji, Cambria, Erik, Li, Yang, Kwok, Kenneth

    Published 2024
    “…Commonsense knowledge acquisition and representation is a core topic in artificial intelligence (AI), which is crucial for building more sophisticated and human-like AI systems. However, existing commonsense knowledge bases organize facts in an isolated manner like bag of facts, lacking the cognitive-level connections that humans commonly possess. …”
    Get full text
    Journal Article