Showing 201 - 220 results of 7,053 for search '((((pinkae OR spengau) OR (pinn OR pin)) OR find) OR (((sains OR spans) OR brings) OR ping))', query time: 0.19s Refine Results
  1. 201

    The inference-boundary model reinterpreting theme and rheme by Leong, Ping Alvin

    Published 2013
    “…The Hallidayan notions of theme and rheme pose an interesting challenge to linguists in their attempts to pin them down more specifically. This paper argues that since the thematic structure of the clause organises it as a message, a useful starting point in theme–rheme research is an understanding of how clausal messages are typically processed by language users. …”
    Get full text
    Get full text
    Journal Article
  2. 202

    Tribological properties of wax microcapsule modified polymers by Ang, Ping Lon

    Published 2013
    “…The tribology test uses the Pin-On-Disk wear test method and the default tribometer settings used in this project were set at 2000m sliding distance, 40cm/s linear speed and 3N linear load. …”
    Get full text
    Final Year Project (FYP)
  3. 203

    Quantum photonic sensors array with machine learning by Ho, Ping-Chien

    Published 2021
    “…DQS-CV protocol can also be used to help improve machine learning which is called the supervised learning assisted by and entangled sensor network(SLAEN).SLAEN converge in less step compared to the conventional algorithm and can find better hyperplanes. It opens a new route to utilize the entanglement power in quantum sensing field.…”
    Get full text
    Thesis-Master by Coursework
  4. 204
  5. 205
  6. 206
  7. 207
  8. 208
  9. 209

    Report on industrial attachment with Soxal Pte Ltd. by Ng, Mei Ping.

    Published 2012
    “…These projects were completed in the later span of 4 months.…”
    Get full text
    Industrial Attachment (IA)
  10. 210

    Cyber attacks and their impacts on the shipping industry. Identify the risks and suggest ways to mitigate. (maritime services) by Poh, Sze Ping

    Published 2021
    “…Moreover, there has been a lack of focus on the danger of adopting technologies compared to the benefit it can bring along. As quoted “It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” by Stephane Nappo (Vice President Global Chief Information Security Officer), the danger of technology can only be secured with proper cyber security measures in-place. …”
    Get full text
    Final Year Project (FYP)
  11. 211

    Safety and accessibility of non-motorised transport in Singapore by Koh, Puay Ping

    Published 2015
    “…The SAI is a multi-perspective (personal, situational and infrastructural compatibility) sophisticated route choice model, that can mimic average NMT decision-making process closely. The findings from this study provide valuable tools for transport professionals in the planning, design and management of NMT infrastructure. …”
    Get full text
    Thesis
  12. 212

    Development of a vision-based gesture human-computer interface by Lim, Chun Ping.

    Published 2010
    “…With a few reasonable assumptions, this stage was achieved with 3 image processing techniques, namely background subtraction by codebook method, skin segmentation and contour convexity finding. To enhance the robustness of the system, a variant codebook method had been created to be used in skin segmentation. …”
    Get full text
    Final Year Project (FYP)
  13. 213
  14. 214
  15. 215
  16. 216
  17. 217
  18. 218
  19. 219
  20. 220