Showing 781 - 800 results of 2,219 for search '(((bina OR pink) OR line) OR (((anda OR (ada OR adam)) OR ((spina OR espina) OR spinao)) OR pin))', query time: 0.21s Refine Results
  1. 781
  2. 782

    Towards superior control in automatic face editing with generative adversarial networks by Zhang, Xijue

    Published 2022
    “…This project examines StyleMapGAN, a novel approach that evolves from StyleGAN by replacing AdaIN with intermediate latent space carrying information on spatial dimensions, hence capable of performing high-quality local editing. …”
    Get full text
    Final Year Project (FYP)
  3. 783

    Audio and video-based extremists detection by Xu, Sijia

    Published 2019
    “…In the third step, five machine learning algorithms (Random Forrest, SVM with RBF kernel, SVM with linear kernel, AdaBoost and Decision Tree) are used in the extremist evaluation base on the extracted features in the second step. …”
    Get full text
    Thesis
  4. 784

    Incremental learning of object detectors using a visual shape alphabet by Opelt, A, Pinz, A, Zisserman, A

    Published 2006
    “…We develop a learning algorithm with the following novel contributions: (i) AdaBoost is adapted to learn jointly, based on shape features; (ii) a new learning schedule enables incremental additions of new categories; and (iii) the algorithm learns to detect objects (instead of categorizing images). …”
    Conference item
  5. 785

    Automated teller machines in Singapore by Soh, Yong Chee, Phua, Alice Loo Huay, Tan,Yang Leng

    Published 2015
    “…Activation of ATMs can also be enhanced by substituting the present A TM card and PIN system with either voice recognition, retina recognition or thumbprints. …”
    Get full text
    Final Year Project (FYP)
  6. 786

    Real time analysis of social behavior from video and kinect recordings by Ramasamy, Pandi Ramesh

    Published 2016
    “…Finally,analysis will be performed using pattern recognition algorithms and machine learning classifiers to detect the emotion of the subject.In this project,machine learning classifiers such as K-nearest neighbors,Naive Bayes and C4.5 Decision tree learning has been used. The prime aim is to pin point the most seemly machine learning classifier for obtaining highest accuracy for classification.…”
    Get full text
    Thesis
  7. 787

    Rapid process modeling of the aerosol jet printing based on gaussian process regression with latin hypercube sampling by Zhang, Haining, Moon, Seung Ki, Ngo, T. H., Tou, J., Bin Mohamed Yusoff, M. A.

    Published 2021
    “…Hence, it is necessary to develop a small data set based machine learning approach to model relationship between the process parameters and the line morphology. In this paper, we propose a rapid process modeling method for AJP process and consider sheath gas flow rate, carrier gas flow rate, stage speed as AJP process parameters, and line width and line roughness as the line morphology. …”
    Get full text
    Journal Article
  8. 788

    Recovery of three-dimensional objects from single two-dimensional sketches using cubic corners by Vishnuprasad Venugopalapanicker

    Published 2011
    “…This report describes the work done to recover 3D objects from a single 2D line drawing using theconcept of cubic corner. …”
    Get full text
    Final Year Project (FYP)
  9. 789
  10. 790

    The inference-boundary model reinterpreting theme and rheme by Leong, Ping Alvin

    Published 2013
    “…The Hallidayan notions of theme and rheme pose an interesting challenge to linguists in their attempts to pin them down more specifically. This paper argues that since the thematic structure of the clause organises it as a message, a useful starting point in theme–rheme research is an understanding of how clausal messages are typically processed by language users. …”
    Get full text
    Get full text
    Journal Article
  11. 791

    The effects of processing conditions on the morphology of single conjugated polymers. by Yeo, Hui Lin.

    Published 2010
    “…Drop-cast single chains were proposed to either retain its extended conformation in CHCl3 solution, or adopt an ordered structure with hair-pin loops, giving rise to two corresponding distinct types of intensity traces. …”
    Get full text
    Final Year Project (FYP)
  12. 792

    Experimental and numerical study of self-locking adaptable inter connection for modular steel structures by Nadeem, Gohar, Safiee, Nor Azizi, Bakar, Nabilah Abu, Karim, Izian Abd, Mohd Nasir, Noor Azline

    Published 2023
    “…The findings indicated that the gap produced between connection and column under higher displacement was sensitive to the outer bolt and spring pin. This gap could be further reduced by increasing the number of outer bolts and by reducing tolerance between adapter and column walls.…”
    Article
  13. 793

    Smart home control system design using internet of things based energy harvesting technology by Silalahi, Lukman Medriavin, Indrawan, Muhammad Rafi, Budiyanto, Setiyo, Hanafi, Dirman, Abdul Hamid, Abdul Hamid, Ronaldo, Davit

    Published 2024
    “…The objective of this research is to provide security for homeowners by facilitating fingerprints and PIN (Personal Identification Numbers) in entering the house, then in the event of a power outage, it activates the function of energy harvesting technology. …”
    Get full text
    Conference or Workshop Item
  14. 794

    Train following model for urban rail transit performance analysis by Saidi, Saeid, Koutsopoulos, Haris N, Wilson, Nigel HM, Zhao, Jinhua

    Published 2024
    “…Based on the model developed, the impacts of factors such as service frequency, headway variations, passenger demand, and initial train delays on line performance (i.e. line throughput and train knock-on delays) are explored. …”
    Get full text
    Article
  15. 795

    Ultra wideBand indoor position localizaiton by Xu, Jun

    Published 2014
    “…It is specifically the case when line-of-sight (LOS) is absent due to severe blockage. …”
    Get full text
    Thesis
  16. 796

    Bila Papa Jatuh Cinta / by Cik D, author 653419

    Published 2015
    “…"Lelaki sekacak saya sentiasa bersiap bersedia dengan sebarang keadaan." Dhani senyum. Ada sesuatu yang cuba diselindungkan. Kalau hati dah kata mahu, apa cara sekali pun dia sanggup. …”
    text
  17. 797

    SHERLOCK HOLMES : JURUBAHASA YUNANI, PERJANJIAN PERKAPALAN & MASALAH TERAKHIR = THE GREEK INTERPRETER, THE NAVAL TREATY & THE FINAL PROBLEM / by Doyle, Arthur Conan, Sir, 1859-1930, author 284049, Rasidah Salleh, translator 655616

    Published 2019
    “…Sherlock, Watson dan Mycroft perlu segera bertindak apabila Melas diculik sekali lagi, kerana kali ini pasti ada nyawa yang akan melayang! Perjanjian Perkapalan - Satu perjanjian antarabangsa penting telah dicuri dari atas meja pejabat Tuan Percy Phelps, yang merupakan rakan lama Watson. …”
    text
  18. 798

    Black-box cryptography is dangerous III by Lee, Esther Yu Ling.

    Published 2013
    “…The issue of a SETUP(Secretly Embedded Trapdoor with Universal Protection) mechanism can be used to leak encrypted information inside a cryptographic algorithm has been raised by Adam Young and Moti Yung, hence this project will explore SETUP attacks on security APIs that are used in a black box manner. …”
    Get full text
    Final Year Project (FYP)
  19. 799

    Scene text recognition by Muhammad Afiq Osman

    Published 2019
    “…However, as for the best optimizer was found to be Adam which was different from the original’s study optimizer of Adadelta. …”
    Get full text
    Final Year Project (FYP)
  20. 800

    Efficient solutions to time-fractional telegraph equations with Chebyshev neural networks by Ali, Amina Hassan, Senu, Norazak, Ahmadian, Ali

    Published 2024
    “…A feed-forward neural network (NN) model, optimized using the adaptive moment estimation (Adam) technique, is utilized to refine network parameters and minimize errors. …”
    Get full text
    Article