Search alternatives:
ceers » cheers (Expand Search), peers (Expand Search), beers (Expand Search)
sheets » sheet (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
tracks » track (Expand Search), cracks (Expand Search), traces (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
ceers » cheers (Expand Search), peers (Expand Search), beers (Expand Search)
sheets » sheet (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
tracks » track (Expand Search), cracks (Expand Search), traces (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
-
41
Counter-checking uncertainty calculations in Bayesian operational modal analysis with EM techniques
Published 2024“…While the existing semi-analytical approach is still preferred for Hessian calculations in applications for its high definitive accuracy and speed, the proposed Monte Carlo solution offers a convenient means for counter-checking during code development. Theoretical implications of the identity will be discussed and numerical examples will be given to illustrate implementation aspects.…”
Get full text
Journal Article -
42
Eye tracking system
Published 2011“…This report is a summary of the project of designing and developing an eye tracking system as one of the research fields of human-computer interaction (HCI). …”
Get full text
Final Year Project (FYP) -
43
People tracking in video
Published 2012“…It is very easy for humans to track a moving object or people in a video clip and to further analyze it to obtain meaningful information. …”
Get full text
Final Year Project (FYP) -
44
A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems
Published 2013“…The extant RFID security protocols have serious insufficiency and flaws to resistance trace attacks and desynchronization attacks. In this paper, we propose a security protocol that can against the intermittent position trace attacks and desynchronization attacks. …”
Get full text
Get full text
Journal Article -
45
De novo-designed β-sheet heme proteins
Published 2021“…By contrast, there are only a few known β-sheet proteins that bind heme and designs of β-sheets frequently result in amyloid-like aggregates. …”
Get full text
Journal Article -
46
Web-based application development for EEE peer tutoring scheme
Published 2024“…The motivation behind this project stems from the need to improve the educational experience by providing a centralized platform that facilitates seamless communication, efficient class booking, and comprehensive progress tracking for both students and tutors. Traditional methods of managing classes and tracking academic progress can be fragmented and time-consuming, often leading to administrative challenges and decreased engagement. …”
Get full text
Final Year Project (FYP) -
47
Dynamics of a self-interacting sheet in shear flow
Published 2024“…We use kinetic and energetic arguments to explain why sheets adopt certain conformations within the folded regime. …”
Get full text
Article -
48
Surface wave interactions with submerged horizontal viscoelastic sheets
Published 2022Subjects: Get full text
Journal Article -
49
Assembly of graphene sheets into 3D macroscopic structures
Published 2013“…Integration of graphene sheets, 2D nanoscale building blocks, into 3D macroscopic assemblies and ultimately into a functional system is essential to explore the advanced properties of individual graphene sheets for macroscopic applications. …”
Get full text
Get full text
Journal Article -
50
Gradient-Based Adversarial Training on Transformer Networks for Detecting Check-Worthy Factual Claims
Published 2024“…s claim-spotting model, which tackles the critical task of identifying check-worthy claims from large streams of information. …”
Get full text
Article -
51
-
52
US trade policy on PV panels is a reality check for Southeast Asia ties
Published 2023Get full text
Commentary -
53
Demonstration of attacks on SSL-TLS protocols
Published 2022“…What is the impact of this attack? 5. What are some strategies to mitigate this attack?…”
Get full text
Final Year Project (FYP) -
54
Study on attacks against federated learning
Published 2022“…The focus is on the coordinated backdoor attack with model-dependant triggers for attack methodology and robust learning rates for defence methodology. …”
Get full text
Final Year Project (FYP) -
55
Differential privacy and membership inference attacks
Published 2023“…Membership inference is a type of attack that identifies the members of the training dataset. …”
Get full text
Final Year Project (FYP) -
56
The political economy of FDI location : why don't political checks and balances and treaty constraints matter?
Published 2009“…I ask whether domestic political checks and balances and international legal instruments that aim to protect FDI enable governments to commit credibly to avoid future policies that diminish the value of suck FDI. …”
Get full text
Get full text
Working Paper -
57
-
58
Occupancy tracking in indoor environment
Published 2024“…To overcome these challenges, this paper proposes an innovative approach to tracking people indoors using Wi Fi technology and AI algorithm technology without relying on traditional sensors. …”
Get full text
Final Year Project (FYP) -
59
Study of face detection and tracking
Published 2009“…Lastly, a more enhanced algorithm, Kalman filter algorithm, is displayed and discussed on its functions and effectiveness on multiple face tracking. The various algorithms and detection methods are studied in details such as how they are derived from and how they detect or track faces. …”
Get full text
Final Year Project (FYP) -
60
Online object detection and tracking
Published 2013“…The report introduces the real-time object detection and tracking by using HOG feature extraction, mean-shift tracking and k-NN classification methods. …”
Get full text
Final Year Project (FYP)