-
121
-
122
Knowledge-based reactive planning and re-planning – a case-study approach
Published 2024“…Planning for uncertainties arising from indoor evacuations can be complex as there’s a fine balance to strike between a too-detailed plan and one that’s too vague. …”
Get full text
Conference or Workshop Item -
123
H∞ gain-scheduled dynamic output feedback control with transient performance applied to electrical microgrid
Published 2024“…We achieve this by employing changes in variables and congruence transformations, which lead to new synthesis conditions expressed as linear matrix inequalities. Additional fine-tuned scalar parameters can be used to enhance further the controller performance in terms of less conservative H-infinity guaranteed costs. …”
Get full text
Article -
124
Determinants of online brand communities’ and millennials’ characteristics: a social influence perspective
Published 2021“…Drawing on social influence theory along with a constructivist perspective, we conducted fine‐grained in‐depth interviews to explore millennials’ participation in online communities and brand perceptions in the fashion industry. …”
Get full text
Article -
125
-
126
Posttraumatic growth as a discursive resource for managing identity after breast cancer : implications for theory, and counselling psychology practice
Published 2015“…The analysis highlights the fine grained features of the women's talk as they manage their post-cancer identities discursively negotiating the social and moral obligation to survive well. …”
Get full text
Thesis -
127
Durability and leachability of concrete containing coal bottom ash and fly ash
Published 2024Get full text
Thesis -
128
Performance of asphalt pavement containing potential cool paving materials
Published 2023Get full text
Thesis -
129
-
130
-
131
Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques
Published 2024“…Concurrently, we address the issues of imbalanced and distributed data and deploy a data curation technique to align generated data within specific constraints. 2) A secondary model fine-tunes local Critics for enhanced resilience and detection of various adversarial attacks. 3) The third model focuses on precise cyber threat identification, leveraging augmented data for improved training under a synthetic federated learning schema, bolstering detection capability, especially against zero-day threats. …”
Get full text
Article -
132
Scalable probabilistic ontology-based method for human activity recognition
Published 2024Get full text
Thesis -
133
-
134
-
135
-
136
-
137
Behaviour and performance of non-cement polymer grouted spiral connection
Published 2023Get full text
Thesis -
138
Toxic species and particulate emissions from synthetic polymer fires
Published 2024Get full text
Thesis -
139
-
140