Showing 41 - 60 results of 7,538 for search '(((ceers OR sheets) OR (cheer OR ((tracks OR attackers) OR checks))) OR peer)', query time: 0.20s Refine Results
  1. 41

    Counter-checking uncertainty calculations in Bayesian operational modal analysis with EM techniques by Ma, Xinda, Au, Siu-Kui

    Published 2024
    “…While the existing semi-analytical approach is still preferred for Hessian calculations in applications for its high definitive accuracy and speed, the proposed Monte Carlo solution offers a convenient means for counter-checking during code development. Theoretical implications of the identity will be discussed and numerical examples will be given to illustrate implementation aspects.…”
    Get full text
    Journal Article
  2. 42

    Eye tracking system by Cheng, Jing.

    Published 2011
    “…This report is a summary of the project of designing and developing an eye tracking system as one of the research fields of human-computer interaction (HCI). …”
    Get full text
    Final Year Project (FYP)
  3. 43

    People tracking in video by Siah, Wee Kiat.

    Published 2012
    “…It is very easy for humans to track a moving object or people in a video clip and to further analyze it to obtain meaningful information. …”
    Get full text
    Final Year Project (FYP)
  4. 44

    A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems by Shu, Yantai, Gao, Lijun, Ma, Maode, Wei, Yuhua

    Published 2013
    “…The extant RFID security protocols have serious insufficiency and flaws to resistance trace attacks and desynchronization attacks. In this paper, we propose a security protocol that can against the intermittent position trace attacks and desynchronization attacks. …”
    Get full text
    Get full text
    Journal Article
  5. 45

    De novo-designed β-sheet heme proteins by D'Souza, Areetha, Bhattacharjya, Surajit

    Published 2021
    “…By contrast, there are only a few known β-sheet proteins that bind heme and designs of β-sheets frequently result in amyloid-like aggregates. …”
    Get full text
    Journal Article
  6. 46

    Web-based application development for EEE peer tutoring scheme by Shan, Xinyi

    Published 2024
    “…The motivation behind this project stems from the need to improve the educational experience by providing a centralized platform that facilitates seamless communication, efficient class booking, and comprehensive progress tracking for both students and tutors. Traditional methods of managing classes and tracking academic progress can be fragmented and time-consuming, often leading to administrative challenges and decreased engagement. …”
    Get full text
    Final Year Project (FYP)
  7. 47

    Dynamics of a self-interacting sheet in shear flow by Funkenbusch, William T., Silmore, Kevin S., Doyle, Patrick S.

    Published 2024
    “…We use kinetic and energetic arguments to explain why sheets adopt certain conformations within the folded regime. …”
    Get full text
    Article
  8. 48
  9. 49

    Assembly of graphene sheets into 3D macroscopic structures by Yin, Shengyan, Niu, Zhiqiang, Chen, Xiaodong

    Published 2013
    “…Integration of graphene sheets, 2D nanoscale building blocks, into 3D macroscopic assemblies and ultimately into a functional system is essential to explore the advanced properties of individual graphene sheets for macroscopic applications. …”
    Get full text
    Get full text
    Journal Article
  10. 50

    Gradient-Based Adversarial Training on Transformer Networks for Detecting Check-Worthy Factual Claims by Meng, Kevin, Jimenez, Damian, Devasier, Jacob, Naraparaju, Sai Sandeep, Arslan, Fatma, Obembe, Daniel, Li, Chengkai

    Published 2024
    “…s claim-spotting model, which tackles the critical task of identifying check-worthy claims from large streams of information. …”
    Get full text
    Article
  11. 51
  12. 52
  13. 53

    Demonstration of attacks on SSL-TLS protocols by Iyer Rajagopal Mahadevan

    Published 2022
    “…What is the impact of this attack? 5. What are some strategies to mitigate this attack?…”
    Get full text
    Final Year Project (FYP)
  14. 54

    Study on attacks against federated learning by Guo, Feiyan

    Published 2022
    “…The focus is on the coordinated backdoor attack with model-dependant triggers for attack methodology and robust learning rates for defence methodology. …”
    Get full text
    Final Year Project (FYP)
  15. 55

    Differential privacy and membership inference attacks by Ong, Ting Yu

    Published 2023
    “…Membership inference is a type of attack that identifies the members of the training dataset. …”
    Get full text
    Final Year Project (FYP)
  16. 56

    The political economy of FDI location : why don't political checks and balances and treaty constraints matter? by Walter, Andrew

    Published 2009
    “…I ask whether domestic political checks and balances and international legal instruments that aim to protect FDI enable governments to commit credibly to avoid future policies that diminish the value of suck FDI. …”
    Get full text
    Get full text
    Working Paper
  17. 57
  18. 58

    Occupancy tracking in indoor environment by Wu, HuiWei

    Published 2024
    “…To overcome these challenges, this paper proposes an innovative approach to tracking people indoors using Wi Fi technology and AI algorithm technology without relying on traditional sensors. …”
    Get full text
    Final Year Project (FYP)
  19. 59

    Study of face detection and tracking by Khew, Zong Jie.

    Published 2009
    “…Lastly, a more enhanced algorithm, Kalman filter algorithm, is displayed and discussed on its functions and effectiveness on multiple face tracking. The various algorithms and detection methods are studied in details such as how they are derived from and how they detect or track faces. …”
    Get full text
    Final Year Project (FYP)
  20. 60

    Online object detection and tracking by Ooi, Jun Han.

    Published 2013
    “…The report introduces the real-time object detection and tracking by using HOG feature extraction, mean-shift tracking and k-NN classification methods. …”
    Get full text
    Final Year Project (FYP)