Showing 961 - 980 results of 3,384 for search '(((bina OR (pinn OR spinn)) OR like) OR ((anna OR ((sping OR swing) OR spino)) OR pin))', query time: 0.19s Refine Results
  1. 961

    Foot clearance measurement by Chia, Roy Hao Wen

    Published 2017
    “…A combination of software like, Arduino and Android Studio is utilized to help create this portable device. …”
    Get full text
    Final Year Project (FYP)
  2. 962

    The Becoming by Chan, Zi Xin

    Published 2017
    “…Ava Lim Hui Shi, an 18 year old girl prepares to undergo the Becoming Test, just like any other child when hitting the prime of maturity. …”
    Get full text
    Final Year Project (FYP)
  3. 963

    Governments of Israel and Egypt : a study of economic and legal policies and their effects on business invesment and opportunities by Ang, Rick Khoon Beng, Loh, Steven Kah Kheong, Tong, Yona Jun Bing, Yeo, Conrad Chien Min

    Published 2008
    “…It covers areas such as the government budget and economic policies to analyse their effects on parameters like inflation, unemployment, balance of payment, budget deficits and GDP growth. …”
    Get full text
    Thesis
  4. 964

    Ceramic membrane bioreactor for wastewater reclamation by Teo, Wei Liang

    Published 2017
    “…Membrane bioreactor is gaining popularity in wastewater treatment due to some advantages over conventional wastewater treatment plant. However, like all membrane technology, membrane fouling remained inevitable. …”
    Get full text
    Final Year Project (FYP)
  5. 965

    Advanced sensors for underground infrastructure by Wang, Aylwin Ziwen

    Published 2018
    “…Various forms of indoor infrastructures have already become more common around the world, especially in high densely populated countries like Singapore. A major concern for the acceptance of such initiatives is the indoor air pollution of such enclosed environments and its impact on public health. …”
    Get full text
    Final Year Project (FYP)
  6. 966

    Development of a system to detect hidden information in a document using steganography software by Wuan, Neng Jie

    Published 2018
    “…This report documents the steps and development process of a software system that implements a signature-based steganalysis approach based on Patterns of Pixel Differences and Random Embedding. Like other blind steganalysis attempts, there will be inherent uncertainties and does not guarantee 100% detection rates. …”
    Get full text
    Final Year Project (FYP)
  7. 967

    Smart LED lighting by Tan, Wee Beng

    Published 2018
    “…The App will have features like manual lighting control, system status display and power saving mode. …”
    Get full text
    Final Year Project (FYP)
  8. 968

    Hydrothermal preparation of carbon nanosheets and their supercapacitive behavior by Liu, Mingzhu, Yan, Ya, Zhang, Lan, Wang, Xin, Wang, Cheng

    Published 2013
    “…Deflated-balloon-like and crumpled carbon nanosheets were prepared via a low-temperature hydrothermal carbonization of glucose at the two-phase interfaces. …”
    Get full text
    Get full text
    Journal Article
  9. 969

    Performance analysis for continuous antennas in Rician channels by Smith, PJ, Khordad, E, Senanayake, R, Coon, JP

    Published 2024
    “…Improved spectral efficiency resulting from more antenna elements has motivated the idea of packing very large numbers of elements in an array, yielding continuous like antennas. This paper conducts a performance analysis of continuous antennas, employing matched filtering. …”
    Journal article
  10. 970

    Violence risk assessment using the Oxford Mental Illness and Violence Tool by Fazel, S, Scola, G

    Published 2024
    “…</li> <li>Traditional risk assessment tools are being replaced by novel tools like OxMIV, which provide probability scores for better clinical assessments.…”
    Journal article
  11. 971

    Wrapped branes and punctured horizons by Bobev, N, Bomans, P, Gautason, FF

    Published 2020
    “…We show that some singular solutions of the Liouville equation have a physical interpretation as explicit point-like brane sources on the Riemann surface. We uncover the details of this picture by focusing on $\mathcal{N}$ = 1 theories of class $\mathcal{S}$ arising from M5-branes on a punctured Riemann surface. …”
    Journal article
  12. 972

    Wrapped branes and punctured horizons by Bobev, N, Bomans, P, Gautason, FF

    Published 2019
    “…We show that some singular solutions of the Liouville equation have a physical interpretation as explicit point-like brane sources on the Riemann surface. We uncover the details of this picture by focusing on $\mathcal{N}$ = 1 theories of class $\mathcal{S}$ arising from M5-branes on a punctured Riemann surface. …”
    Internet publication
  13. 973

    New approach to obtain height measurements from video by Criminisi, A, Zisserman, A, Van Gool, LJ, Bramble, SK, Compton, D

    Published 1999
    “…A height measurement is obtained from each frame of the video. A `stereo like' correspondence between images is not required. …”
    Conference item
  14. 974

    Linguistic distance and market integration in India by Fenske, J, Kala, N

    Published 2021
    “…A one-standard-deviation increase in linguistic distance predicts a reduction in the price correlation between two markets of 0.121 standard deviations for wheat, 0.181 for salt, and 0.088 for rice. While factors like genetic distance, literacy gaps, and railway connections are correlated with linguistic distance, they do not fully explain the correlation between linguistic distance and market integration.…”
    Journal article
  15. 975

    The uniqueness trap by Flyvbjerg, B, Budzier, A, Christodoulou, MD, Zottoli, M

    Published 2025
    “…Project managers and planners are highly prone to believing that their projects are one of a kind—partly because those that seem new and distinctive are more likely to win support. But research on 1,300-plus projects reveals that few, if any, actually are unique. …”
    Journal article
  16. 976

    A contract negotiation scheme for safety verification of interconnected systems by Tan, X, Papachristodoulou, A, Dimarogonas, DV

    Published 2024
    “…In this paper, we show that compositional methods like AGC can mitigate this problem. We formulate the synthesis problem into a set of small-size problems, which constructs local contracts for subsystems, and propose a negotiation scheme among the subsystems at the contract level. …”
    Journal article
  17. 977

    Behaviorally informed digital campaigns and their association with social media engagement and COVID-19 vaccine uptake in Belize by Daga, Giuliana, Kossuth, Lajos, Boruchowicz, Cynthia, Lopez Boo, Florencia, Largaespada Beer, Natalia

    Published 2024
    “…However, lack of trust in the vaccine and fear of side effects in regions like the Caribbean resulted in a low uptake despite enough vaccine supply. …”
    Get full text
    Article
  18. 978

    Creative AI : a data-driven design approach for creative online ad optimisation using artificial intelligence and big data by Phay, Han

    Published 2020
    “…Through the integration of Artificial Intelligence and Big Data with current industry processes, a new kind of advertising agency will emerge that is run like a tech company. Using Big Data to inform creative design and Artificial Intelligence to identify patterns, predictive analysis can be applied to creative online banner ads for the purpose of increasing user engagement through higher click-through rates. …”
    Get full text
    Thesis-Master by Research
  19. 979
  20. 980

    Two sides of the same coin : boons and banes of machine learning in hardware security by Liu, Wenye, Chang, Chip Hong, Wang, Xueyang, Liu, Chen, Fung, Jason M., Mohammad Ebrahimabadi, Karimi, Naghmeh, Meng, Xingyu, Basu, Kanad

    Published 2022
    “…ML schemes have been extensively used to enhance the security and trust of embedded systems like hardware Trojans and malware detection. On the other hand, ML-based approaches have also been adopted by adversaries to assist side-channel attacks, reverse engineer integrated circuits and break hardware security primitives like Physically Unclonable Functions (PUFs). …”
    Get full text
    Journal Article