Search alternatives:
pinnau » pinna (Expand Search), pinnae (Expand Search), pingnau (Expand Search), spinnau (Expand Search)
spinna » pinna (Expand Search), spina (Expand Search), spingna (Expand Search), sspinna (Expand Search)
spike » spie (Expand Search)
spingk » spink (Expand Search), spinggk (Expand Search), sspingk (Expand Search)
scans » scan (Expand Search)
spingau » spinggau (Expand Search), sspingau (Expand Search)
pin » ping (Expand Search), spin (Expand Search)
pinnau » pinna (Expand Search), pinnae (Expand Search), pingnau (Expand Search), spinnau (Expand Search)
spinna » pinna (Expand Search), spina (Expand Search), spingna (Expand Search), sspinna (Expand Search)
spike » spie (Expand Search)
spingk » spink (Expand Search), spinggk (Expand Search), sspingk (Expand Search)
scans » scan (Expand Search)
spingau » spinggau (Expand Search), sspingau (Expand Search)
pin » ping (Expand Search), spin (Expand Search)
-
261
High wavenumber coherent structures in low re apg-boundary-layer transition flow—a numerical study
Published 2019“…Both parts are imbedded at the primary Λ-vortex stage and spatially coincide with the spike region and high shear layer. The tip part is associated with the later first ring-like vortex, while the rear part with the remainder of the Λ-vortex. …”
Get full text
Get full text
Journal Article -
262
Time to fill up India’s strategic oil reserves
Published 2015“…Although oil stocks are generally not released to manage oil prices (the IEA’s intention is to stabilize the market and release stocks only in case of physical shortages), it may be possible to use the stored oil to offset a spike in oil prices, especially for developing countries which have administered oil prices.…”
Journal article -
263
Modelling Malaysia air quality data using Bayesian Structural Time Series models
Published 2024“…The BSTS model integrates three main techniques: The structural model, which employs the Kalman filter approach to model trend and seasonality components; spike and slab regression for variable selection; and Bayesian model averaging to estimate the best-performing prediction model while accounting for uncertainty. …”
Get full text
Article -
264
Micro-RBS study of nickel silicide formation
Published 2013“…The beam was focused to submicron dimensions for the scans over the narrow lines. μ-RBS results for the different silicide structures are presented and correlated with micro-Raman data.…”
Get full text
Get full text
Journal Article -
265
Automated teller machines in Singapore
Published 2015“…Activation of ATMs can also be enhanced by substituting the present A TM card and PIN system with either voice recognition, retina recognition or thumbprints. …”
Get full text
Final Year Project (FYP) -
266
Real time analysis of social behavior from video and kinect recordings
Published 2016“…Finally,analysis will be performed using pattern recognition algorithms and machine learning classifiers to detect the emotion of the subject.In this project,machine learning classifiers such as K-nearest neighbors,Naive Bayes and C4.5 Decision tree learning has been used. The prime aim is to pin point the most seemly machine learning classifier for obtaining highest accuracy for classification.…”
Get full text
Thesis -
267
Environmental damping and vibrational coupling of confined fluids within isolated carbon nanotubes
Published 2024“…An analysis based on a harmonic oscillator model assigns the distinctive frequency cusp, produced over 93 scans of 3 distinct DWNTs, along with the hyperbolic trajectory, to a reversible increase in damping from graphitic ribbons on the exterior surface. …”
Get full text
Article -
268
Imaging and processing of tree trunk
Published 2020“…In this report, planar B-Scans using EM waves were explored and seeks to analyse how does the various tree condition affects the planar B-Scan results. …”
Get full text
Final Year Project (FYP) -
269
SectionKey: 3-D semantic point cloud descriptor for place recognition in large-scale environments
Published 2022“…More recent attention has been attracted to use 3-D Light Detection and Ranging (LiDAR) scans, where most of the LiDAR-based methods work by leveraging accurate geometric information that demonstrates more credibility. …”
Get full text
Thesis-Master by Coursework -
270
Development of a real time 3D surgical scene for natural orifice endoscopic surgery
Published 2010“…Intra-operative module (tracking system) would be the author’s main focus of the report. CT scans would be the referencing images. The softwares used are IGSTK and 3D Slicer. …”
Get full text
Final Year Project (FYP) -
271
Finite element analysis of shoulder rotator cuff
Published 2010“…This project is a continuation from past final year projects, whereby the predecessors had created 3D models of the shoulder tendons from Magnetic Resonance Imaging (MRI) scans. This has provided the author an excellent foundation to build on and start carrying out FEA on the models. …”
Get full text
Final Year Project (FYP) -
272
Segmentation of magnetic resonance images for assessing neonatal brain maturation
Published 2016“…This thesis thus focuses on structural segmentation and spatio-temporal modelling of the so-called myelin-like signals on T2-weighted scans for early prognostic evaluation of the preterm brain.…”
Thesis -
273
A comparison of lesion mapping analyses based on CT versus MR imaging in stroke
Published 2023“…This finding is critically important as it suggests that future studies can employ CT-derived lesion masks if these scans are available within the appropriate time-window.…”
Journal article -
274
Quantifying canine tissue stiffness change patterns using shear-wave elastography: implications for time of death estimation
Published 2024“…The Mann-Whitney U-test and Spearman correlation coefficient showed insignificant correlation between gender and weight with shear-wave velocity (SWV) in ante-mortem scans. The Kruskal-Wallis H-test showed significant differences in SWV for all organs. …”
Article -
275
The inference-boundary model reinterpreting theme and rheme
Published 2013“…The Hallidayan notions of theme and rheme pose an interesting challenge to linguists in their attempts to pin them down more specifically. This paper argues that since the thematic structure of the clause organises it as a message, a useful starting point in theme–rheme research is an understanding of how clausal messages are typically processed by language users. …”
Get full text
Get full text
Journal Article -
276
The effects of processing conditions on the morphology of single conjugated polymers.
Published 2010“…Drop-cast single chains were proposed to either retain its extended conformation in CHCl3 solution, or adopt an ordered structure with hair-pin loops, giving rise to two corresponding distinct types of intensity traces. …”
Get full text
Final Year Project (FYP) -
277
Experimental and numerical study of self-locking adaptable inter connection for modular steel structures
Published 2023“…The findings indicated that the gap produced between connection and column under higher displacement was sensitive to the outer bolt and spring pin. This gap could be further reduced by increasing the number of outer bolts and by reducing tolerance between adapter and column walls.…”
Article -
278
Smart home control system design using internet of things based energy harvesting technology
Published 2024“…The objective of this research is to provide security for homeowners by facilitating fingerprints and PIN (Personal Identification Numbers) in entering the house, then in the event of a power outage, it activates the function of energy harvesting technology. …”
Get full text
Conference or Workshop Item -
279
Executive's Cybersecurity Program Handbook : A comprehensive guide to building and operationalizing a complete cybersecurity program /
Published 2023“…What you will learn Explore various cybersecurity frameworks such as NIST and ISO Implement industry-standard cybersecurity policies and procedures effectively to minimize the risk of cyberattacks Find out how to hire the right talent for building a sound cybersecurity team structure Understand the difference between security awareness and training Explore the zero-trust concept and various firewalls to secure your environment Harden your operating system and server to enhance the security Perform scans to detect vulnerabilities in software Who this book is for This book is for you if you are a newly appointed security team manager, director, or C-suite executive who is in the transition stage or new to the information security field and willing to empower yourself with the required knowledge. …”
Get full text
Get full text
software, multimedia -
280
Towards haptic intelligence in robots by learning from demonstration
Published 2022“…Specifically, the contribution here is the viewing of triangular meshes of objects, i.e., the internal model extracted from their 3D scans, not only as a source of geometric information, but also of haptic feedback. …”
Get full text
Thesis-Doctor of Philosophy