Search alternatives:
bina » bin (Expand Search), bing (Expand Search)
pink » link (Expand Search), ping (Expand Search), pick (Expand Search), pingk (Expand Search), spink (Expand Search)
line » like (Expand Search), life (Expand Search)
ada » pada (Expand Search)
adam » padam (Expand Search), alam (Expand Search), awam (Expand Search)
spina » spinal (Expand Search), spinae (Expand Search), spin (Expand Search), spinga (Expand Search), sspina (Expand Search)
espina » espinal (Expand Search), espinae (Expand Search), espin (Expand Search), espinar (Expand Search), espana (Expand Search), espinosa (Expand Search), espinga (Expand Search), esspina (Expand Search)
spinao » spinalo (Expand Search), spinaeo (Expand Search), spino (Expand Search), spinal (Expand Search), spinae (Expand Search), spingao (Expand Search), sspinao (Expand Search)
pin » ping (Expand Search), spin (Expand Search)
bina » bin (Expand Search), bing (Expand Search)
pink » link (Expand Search), ping (Expand Search), pick (Expand Search), pingk (Expand Search), spink (Expand Search)
line » like (Expand Search), life (Expand Search)
ada » pada (Expand Search)
adam » padam (Expand Search), alam (Expand Search), awam (Expand Search)
spina » spinal (Expand Search), spinae (Expand Search), spin (Expand Search), spinga (Expand Search), sspina (Expand Search)
espina » espinal (Expand Search), espinae (Expand Search), espin (Expand Search), espinar (Expand Search), espana (Expand Search), espinosa (Expand Search), espinga (Expand Search), esspina (Expand Search)
spinao » spinalo (Expand Search), spinaeo (Expand Search), spino (Expand Search), spinal (Expand Search), spinae (Expand Search), spingao (Expand Search), sspinao (Expand Search)
pin » ping (Expand Search), spin (Expand Search)
-
781
Evacuation preparedness and safety perception through a 3D game environment
Published 2020Get full text
Final Year Project (FYP) -
782
Towards superior control in automatic face editing with generative adversarial networks
Published 2022“…This project examines StyleMapGAN, a novel approach that evolves from StyleGAN by replacing AdaIN with intermediate latent space carrying information on spatial dimensions, hence capable of performing high-quality local editing. …”
Get full text
Final Year Project (FYP) -
783
Audio and video-based extremists detection
Published 2019“…In the third step, five machine learning algorithms (Random Forrest, SVM with RBF kernel, SVM with linear kernel, AdaBoost and Decision Tree) are used in the extremist evaluation base on the extracted features in the second step. …”
Get full text
Thesis -
784
Incremental learning of object detectors using a visual shape alphabet
Published 2006“…We develop a learning algorithm with the following novel contributions: (i) AdaBoost is adapted to learn jointly, based on shape features; (ii) a new learning schedule enables incremental additions of new categories; and (iii) the algorithm learns to detect objects (instead of categorizing images). …”
Conference item -
785
Automated teller machines in Singapore
Published 2015“…Activation of ATMs can also be enhanced by substituting the present A TM card and PIN system with either voice recognition, retina recognition or thumbprints. …”
Get full text
Final Year Project (FYP) -
786
Real time analysis of social behavior from video and kinect recordings
Published 2016“…Finally,analysis will be performed using pattern recognition algorithms and machine learning classifiers to detect the emotion of the subject.In this project,machine learning classifiers such as K-nearest neighbors,Naive Bayes and C4.5 Decision tree learning has been used. The prime aim is to pin point the most seemly machine learning classifier for obtaining highest accuracy for classification.…”
Get full text
Thesis -
787
Rapid process modeling of the aerosol jet printing based on gaussian process regression with latin hypercube sampling
Published 2021“…Hence, it is necessary to develop a small data set based machine learning approach to model relationship between the process parameters and the line morphology. In this paper, we propose a rapid process modeling method for AJP process and consider sheath gas flow rate, carrier gas flow rate, stage speed as AJP process parameters, and line width and line roughness as the line morphology. …”
Get full text
Journal Article -
788
Recovery of three-dimensional objects from single two-dimensional sketches using cubic corners
Published 2011“…This report describes the work done to recover 3D objects from a single 2D line drawing using theconcept of cubic corner. …”
Get full text
Final Year Project (FYP) -
789
-
790
The inference-boundary model reinterpreting theme and rheme
Published 2013“…The Hallidayan notions of theme and rheme pose an interesting challenge to linguists in their attempts to pin them down more specifically. This paper argues that since the thematic structure of the clause organises it as a message, a useful starting point in theme–rheme research is an understanding of how clausal messages are typically processed by language users. …”
Get full text
Get full text
Journal Article -
791
The effects of processing conditions on the morphology of single conjugated polymers.
Published 2010“…Drop-cast single chains were proposed to either retain its extended conformation in CHCl3 solution, or adopt an ordered structure with hair-pin loops, giving rise to two corresponding distinct types of intensity traces. …”
Get full text
Final Year Project (FYP) -
792
Experimental and numerical study of self-locking adaptable inter connection for modular steel structures
Published 2023“…The findings indicated that the gap produced between connection and column under higher displacement was sensitive to the outer bolt and spring pin. This gap could be further reduced by increasing the number of outer bolts and by reducing tolerance between adapter and column walls.…”
Article -
793
Smart home control system design using internet of things based energy harvesting technology
Published 2024“…The objective of this research is to provide security for homeowners by facilitating fingerprints and PIN (Personal Identification Numbers) in entering the house, then in the event of a power outage, it activates the function of energy harvesting technology. …”
Get full text
Conference or Workshop Item -
794
Train following model for urban rail transit performance analysis
Published 2024“…Based on the model developed, the impacts of factors such as service frequency, headway variations, passenger demand, and initial train delays on line performance (i.e. line throughput and train knock-on delays) are explored. …”
Get full text
Article -
795
Ultra wideBand indoor position localizaiton
Published 2014“…It is specifically the case when line-of-sight (LOS) is absent due to severe blockage. …”
Get full text
Thesis -
796
Bila Papa Jatuh Cinta /
Published 2015“…"Lelaki sekacak saya sentiasa bersiap bersedia dengan sebarang keadaan." Dhani senyum. Ada sesuatu yang cuba diselindungkan. Kalau hati dah kata mahu, apa cara sekali pun dia sanggup. …”
text -
797
SHERLOCK HOLMES : JURUBAHASA YUNANI, PERJANJIAN PERKAPALAN & MASALAH TERAKHIR = THE GREEK INTERPRETER, THE NAVAL TREATY & THE FINAL PROBLEM /
Published 2019“…Sherlock, Watson dan Mycroft perlu segera bertindak apabila Melas diculik sekali lagi, kerana kali ini pasti ada nyawa yang akan melayang! Perjanjian Perkapalan - Satu perjanjian antarabangsa penting telah dicuri dari atas meja pejabat Tuan Percy Phelps, yang merupakan rakan lama Watson. …”
text -
798
Black-box cryptography is dangerous III
Published 2013“…The issue of a SETUP(Secretly Embedded Trapdoor with Universal Protection) mechanism can be used to leak encrypted information inside a cryptographic algorithm has been raised by Adam Young and Moti Yung, hence this project will explore SETUP attacks on security APIs that are used in a black box manner. …”
Get full text
Final Year Project (FYP) -
799
Scene text recognition
Published 2019“…However, as for the best optimizer was found to be Adam which was different from the original’s study optimizer of Adadelta. …”
Get full text
Final Year Project (FYP) -
800
Efficient solutions to time-fractional telegraph equations with Chebyshev neural networks
Published 2024“…A feed-forward neural network (NN) model, optimized using the adaptive moment estimation (Adam) technique, is utilized to refine network parameters and minimize errors. …”
Get full text
Article