Search alternatives:
spinne » spinner (Expand Search), spine (Expand Search), spinae (Expand Search), spingne (Expand Search), sspinne (Expand Search)
pinnae » pinna (Expand Search), pinnau (Expand Search), pinnacle (Expand Search), pingnae (Expand Search), spinnae (Expand Search)
lianne » dianne (Expand Search), lianhe (Expand Search), leanne (Expand Search)
huange » huang (Expand Search), huanle (Expand Search), hwange (Expand Search)
hiang » chiang (Expand Search), huang (Expand Search), liang (Expand Search)
pinga » pingat (Expand Search), pingao (Expand Search), ping (Expand Search), pingga (Expand Search), spinga (Expand Search)
spinga » spingat (Expand Search), spingao (Expand Search), sping (Expand Search), spina (Expand Search), spingga (Expand Search), sspinga (Expand Search)
pin » ping (Expand Search), spin (Expand Search)
link » line (Expand Search)
spinne » spinner (Expand Search), spine (Expand Search), spinae (Expand Search), spingne (Expand Search), sspinne (Expand Search)
pinnae » pinna (Expand Search), pinnau (Expand Search), pinnacle (Expand Search), pingnae (Expand Search), spinnae (Expand Search)
lianne » dianne (Expand Search), lianhe (Expand Search), leanne (Expand Search)
huange » huang (Expand Search), huanle (Expand Search), hwange (Expand Search)
hiang » chiang (Expand Search), huang (Expand Search), liang (Expand Search)
pinga » pingat (Expand Search), pingao (Expand Search), ping (Expand Search), pingga (Expand Search), spinga (Expand Search)
spinga » spingat (Expand Search), spingao (Expand Search), sping (Expand Search), spina (Expand Search), spingga (Expand Search), sspinga (Expand Search)
pin » ping (Expand Search), spin (Expand Search)
link » line (Expand Search)
-
1741
Data Analytics for Cybersecurity /
Published 2022“…Data is a common thread linking various types of devices and end users. Analyzing data across different segments of cybersecurity domains, particularly data generated during cyber-attacks, can help us understand threats better, prevent future cyber-attacks, and provide insights into the evolving cyber threat landscape. …”
Get full text
software, multimedia -
1742
Rethinking the Evaluation of Compositional Reasoning for Modern VLMs
Published 2024Get full text
Thesis -
1743
Improving rock mass quality using bio-grouting
Published 2022Get full text
Final Year Project (FYP) -
1744
Brittle to ductile transition of polystyrene by high temperature programming
Published 2023Get full text
Final Year Project (FYP) -
1745
An empirical study on the effects of promotion of corporate social responsibility on employees’ organizational citizenship behaviors.
Published 2013Get full text
Final Year Project (FYP) -
1746
Experimental study of rectangular floating breakwater
Published 2013Get full text
Final Year Project (FYP) -
1747
Development of a generic framework for dynamic website design
Published 2014Get full text
Final Year Project (FYP) -
1748
-
1749
-
1750
-
1751
Spatiotemporal saliency detection via sparse representation
Published 2013Get full text
Get full text
Conference Paper -
1752
Circulating current control scheme of modular multilevel converters supplying passive networks under unbalanced load conditions
Published 2020“…Load imbalances in the supply of passive loads with modular multilevel converter (MMC)-based medium (MVDC) and high voltage (HVDC) dc-links are inevitable. In such applications, the maximum-allowable voltage ripples and peak arm currents define the operating limits of the MMCs. …”
Get full text
Journal Article -
1753
Adaptive macro spatial modulation for mmWave dense networks
Published 2021“…In the proposed scheme, a user equipment (UE) adaptively establishes communication links with multiple small base stations (SBSs) and switches its beam direction between these SBSs according to part of its transmitting information. …”
Get full text
Journal Article -
1754
Measurement and calibration of a six-axis reconfigurable parallel robot system
Published 2008“…A modular reconfigurable parallel robot system consists of standardized links and joint components that can be assembled into a particular geometry for specific tasks. …”
Get full text
Research Report -
1755
Analysis of V2X communications
Published 2015“…Due to certain limitations of the Matlab – Vissim Com interface, there are some features like the auto-generation of the road links cannot be done. This called for the manual-generating of the road links of the NTU campus map. …”
Get full text
Final Year Project (FYP) -
1756
Markers of synovial inflammation in cohorts at risk of knee osteoarthritis
Published 2016“…Additionally, it is possibly linked with premature mortality. Low-grade inflammation is associated with a high risk of non-traumatic KOA incidence but also with metabolic syndrome. …”
Thesis -
1757
Ventricular volume asymmetry as a novel imaging biomarker for disease discrimination and outcome prediction
Published 2024“…Clinical outcomes were defined through linked health records. Incident events were those occurring for the first time after imaging, longitudinally tracked over an average follow-up time of 4.75 ± 1.52 years. …”
Journal article -
1758
Pronoun drop and prosocial behavior : experimental evidence from Japan
Published 2020“…Given that our results provide little empirical support for previous research findings linking first-person pronoun use and lower pro-sociality, we prescribe caution in using languages as a proxy for culture in several cross-country empirical studies in economics.…”
Get full text
Journal Article -
1759
Facial spoofing indicator using deep learning
Published 2022“…Out of all the biometric verification, facial biometric verification is the most common. Facial biometric is linked with an increase in vulnerability to facial spoofing attacks as it is easy to acquire individuals’ photos from platforms such as social media or Google. …”
Get full text
Final Year Project (FYP) -
1760
Investment in China : reform and policy
Published 2011“…The focus is on the determination of investment with a view to identifying its specific financing sources, mechanism, and links with monetary and fiscal policies. The analysis is mainly based on a modified version of the flexible accelerator theory of investment. …”
Get full text
Thesis