Showing 41 - 60 results of 449 for search '(( (apal OR apply) (name OR same) ) OR ( (papa OR para) (name OR same) ))', query time: 0.16s Refine Results
  1. 41

    Power-stage design for switched- mode DC-DC converter by Lim, Yong Siah

    Published 2015
    “…Further, we investigate the low-swing method for the buffer design. We apply the optimum tapering factor, the optimum sizing method, and the low-swing method to our buffer and power transistor design. …”
    Get full text
    Final Year Project (FYP)
  2. 42

    Computational Approaches for Understanding and Redesigning Enzyme Catalysis by Karvelis, Elijah

    Published 2025
    “…In the second study, we examine the effects of these same mutations on the isomerization of KARI's other native substrate: 2-aceto-2-hydroxybutyrate (AHB), and we find that the mutants selected for increased activity on ACL had varied levels of activity on AHB. …”
    Get full text
    Get full text
    Thesis
  3. 43

    Slide-and-Read: Making Sense of Reading using Cognitive Support Application and Tool (S/O 14334) by Husni, Husniza, Jamaludin, Zulikha

    Published 2021
    “…Inspired by the success of our tangible manipulative, also named Slide-and-Read, we took the initiative to apply the same concept and design to develop a digital artefact of the said manipulative. …”
    Get full text
    Monograph
  4. 44

    Shortest paths without a map, but with an entropic regularizer by Bubeck, S, Coester, C, Rabani, Y

    Published 2024
    “…In this work we show how to apply the mirror descent framework on a carefully selected evolving metric space, and obtain an 𝑂(𝑘 2 )-competitive randomized online algorithm. …”
    Journal article
  5. 45

    Essays on the measurement of leverage and risk of banking institutions by Yong, Vincent Gan Beng

    Published 2015
    “…The index is aptly named the Capital Leverage Index or CapLev. It is also further shown how we can apply the methodology in constructing a new systemic risk measure, the Systemic Marginal Leverage Index or SysLev. …”
    Get full text
    Thesis
  6. 46
  7. 47

    Optical gradient force for all-optical control in photonic circuits by Xu, Kaijun.

    Published 2011
    “…In this project, we apply the optical gradient force in a slot-waveguide structure for all-optical control of a mechanically variable waveguide structure. …”
    Get full text
    Final Year Project (FYP)
  8. 48

    iPad application development for sports video analysis by Truong Huynh, Quang Trung

    Published 2014
    “…The second is to develop an IPAD application that can retrieve the results and at the same time allow user to make any adjustment if needed. …”
    Get full text
    Final Year Project (FYP)
  9. 49

    Hyperbolic volume estimates via train tracks by De Capua, A

    Published 2016
    “…The present distance estimate is inspired by a result of Masur, Mosher and Schleimer for distances in the marking graph. However, we can apply their line of proof only after some manipulation of the splitting sequence: a rearrangement, changing the order the elementary moves are performed in, so that the ones producing Dehn twists are brought together; and then an untwisting, which suppresses the majority of these latter moves to give a new sequence, which does not end with the same track as before, but does not include any portion that is almost stationary in the pants graph. …”
    Thesis
  10. 50
  11. 51
  12. 52

    Complex-image-based sparse sar imaging and its equivalence by Bi, Hui, Bi, Guoan, Zhang, Bingchen, Hong, Wen

    Published 2020
    “…The computational complexity is also decreased to the same order as that of MF, which makes the real-Time sparse SAR imaging become possible. …”
    Get full text
    Journal Article
  13. 53

    The imagination of eco-disaster : post-disaster rebuilding in Asian cinema by Chu, Kiu-Wai

    Published 2021
    “…To contemporary film viewers, the ‘psychic numbing’ effect is apparent, and it does not apply merely to our perception of numbers, statistics, the big data. …”
    Get full text
    Journal Article
  14. 54

    Sproutly : plantable packaging by Dhanusha Surendran

    Published 2021
    “…Businesses can modify and apply the material to their preexisting materials such as print and packaging. …”
    Get full text
    Final Year Project (FYP)
  15. 55

    Distributed classification with variable distributions by Quach, Vinh Thanh

    Published 2015
    “…When the data at a location is insufficient, one may apply a naive solution to gather data from other (remote) places and classify it using a centralized algorithm. …”
    Get full text
    Thesis
  16. 56

    Cycle-based trading & portfolio management system by Zhan, Xiaoying

    Published 2016
    “…This research project aims to apply machine learning techniques in the area of financial investment. …”
    Get full text
    Final Year Project (FYP)
  17. 57

    A vision based system for modern transportation system by Zhang, Zhicheng

    Published 2019
    “…By doing so, we can use it as part of the tools to catch drivers that are speeding. Similarly, we can apply the same concept for traffic signages which enable vehicles to identify the various traffic signages and inform the driver accordingly. …”
    Get full text
    Final Year Project (FYP)
  18. 58

    The electrochemistry of metalloenzymes confined in ionic liquids by Wang, Y

    Published 2016
    “…CO2 reduction and CO oxidation electrocatalysed by CODH I<sub><em>Ch</em></sub> occurred at the same time in the tiny aqueous shell, according to cyclic voltammetry. …”
    Thesis
  19. 59

    HPC simulations of information propagation over complex networks by Jin, Jiangming

    Published 2015
    “…High Performance Computing (HPC) is a technology that may be used to apply optimized algorithms on powerful new hardware resources for accelerating execution performance. …”
    Get full text
    Thesis
  20. 60

    Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks by Zhang, Zhengyan, Xiao, Guangxuan, Li, Yongwei, Lv, Tian, Qi, Fanchao, Liu, Zhiyuan, Wang, Yasheng, Jiang, Xin, Sun, Maosong

    Published 2024
    “…Attackers can restrict the output representations (the values of output neurons) of trigger-embedded samples to arbitrary predefined values through additional training, namely neuron-level backdoor attack (NeuBA). Since fine-tuning has little effect on model parameters, the fine-tuned model will retain the backdoor functionality and predict a specific label for the samples embedded with the same trigger. …”
    Get full text
    Article