Search alternatives:
apal » kapal (Expand Search), apa (Expand Search), appl (Expand Search)
name » named (Expand Search), game (Expand Search)
same » some (Expand Search)
papa » pada (Expand Search), apa (Expand Search), bapa (Expand Search)
para » part (Expand Search), pada (Expand Search), park (Expand Search)
apal » kapal (Expand Search), apa (Expand Search), appl (Expand Search)
name » named (Expand Search), game (Expand Search)
same » some (Expand Search)
papa » pada (Expand Search), apa (Expand Search), bapa (Expand Search)
para » part (Expand Search), pada (Expand Search), park (Expand Search)
-
41
Power-stage design for switched- mode DC-DC converter
Published 2015“…Further, we investigate the low-swing method for the buffer design. We apply the optimum tapering factor, the optimum sizing method, and the low-swing method to our buffer and power transistor design. …”
Get full text
Final Year Project (FYP) -
42
Computational Approaches for Understanding and Redesigning Enzyme Catalysis
Published 2025“…In the second study, we examine the effects of these same mutations on the isomerization of KARI's other native substrate: 2-aceto-2-hydroxybutyrate (AHB), and we find that the mutants selected for increased activity on ACL had varied levels of activity on AHB. …”
Get full text
Get full text
Thesis -
43
Slide-and-Read: Making Sense of Reading using Cognitive Support Application and Tool (S/O 14334)
Published 2021“…Inspired by the success of our tangible manipulative, also named Slide-and-Read, we took the initiative to apply the same concept and design to develop a digital artefact of the said manipulative. …”
Get full text
Monograph -
44
Shortest paths without a map, but with an entropic regularizer
Published 2024“…In this work we show how to apply the mirror descent framework on a carefully selected evolving metric space, and obtain an 𝑂(𝑘 2 )-competitive randomized online algorithm. …”
Journal article -
45
Essays on the measurement of leverage and risk of banking institutions
Published 2015“…The index is aptly named the Capital Leverage Index or CapLev. It is also further shown how we can apply the methodology in constructing a new systemic risk measure, the Systemic Marginal Leverage Index or SysLev. …”
Get full text
Thesis -
46
Specification and Verification of Strong Timing Isolation of Hardware Enclaves
Published 2025Get full text
Article -
47
Optical gradient force for all-optical control in photonic circuits
Published 2011“…In this project, we apply the optical gradient force in a slot-waveguide structure for all-optical control of a mechanically variable waveguide structure. …”
Get full text
Final Year Project (FYP) -
48
iPad application development for sports video analysis
Published 2014“…The second is to develop an IPAD application that can retrieve the results and at the same time allow user to make any adjustment if needed. …”
Get full text
Final Year Project (FYP) -
49
Hyperbolic volume estimates via train tracks
Published 2016“…The present distance estimate is inspired by a result of Masur, Mosher and Schleimer for distances in the marking graph. However, we can apply their line of proof only after some manipulation of the splitting sequence: a rearrangement, changing the order the elementary moves are performed in, so that the ones producing Dehn twists are brought together; and then an untwisting, which suppresses the majority of these latter moves to give a new sequence, which does not end with the same track as before, but does not include any portion that is almost stationary in the pants graph. …”
Thesis -
50
Parallel-Jaw Gripper and Grasp Co-Optimization for Sets of Planar Objects
Published 2024Get full text
Article -
51
-
52
Complex-image-based sparse sar imaging and its equivalence
Published 2020“…The computational complexity is also decreased to the same order as that of MF, which makes the real-Time sparse SAR imaging become possible. …”
Get full text
Journal Article -
53
The imagination of eco-disaster : post-disaster rebuilding in Asian cinema
Published 2021“…To contemporary film viewers, the ‘psychic numbing’ effect is apparent, and it does not apply merely to our perception of numbers, statistics, the big data. …”
Get full text
Journal Article -
54
Sproutly : plantable packaging
Published 2021“…Businesses can modify and apply the material to their preexisting materials such as print and packaging. …”
Get full text
Final Year Project (FYP) -
55
Distributed classification with variable distributions
Published 2015“…When the data at a location is insufficient, one may apply a naive solution to gather data from other (remote) places and classify it using a centralized algorithm. …”
Get full text
Thesis -
56
Cycle-based trading & portfolio management system
Published 2016“…This research project aims to apply machine learning techniques in the area of financial investment. …”
Get full text
Final Year Project (FYP) -
57
A vision based system for modern transportation system
Published 2019“…By doing so, we can use it as part of the tools to catch drivers that are speeding. Similarly, we can apply the same concept for traffic signages which enable vehicles to identify the various traffic signages and inform the driver accordingly. …”
Get full text
Final Year Project (FYP) -
58
The electrochemistry of metalloenzymes confined in ionic liquids
Published 2016“…CO2 reduction and CO oxidation electrocatalysed by CODH I<sub><em>Ch</em></sub> occurred at the same time in the tiny aqueous shell, according to cyclic voltammetry. …”
Thesis -
59
HPC simulations of information propagation over complex networks
Published 2015“…High Performance Computing (HPC) is a technology that may be used to apply optimized algorithms on powerful new hardware resources for accelerating execution performance. …”
Get full text
Thesis -
60
Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks
Published 2024“…Attackers can restrict the output representations (the values of output neurons) of trigger-embedded samples to arbitrary predefined values through additional training, namely neuron-level backdoor attack (NeuBA). Since fine-tuning has little effect on model parameters, the fine-tuned model will retain the backdoor functionality and predict a specific label for the samples embedded with the same trigger. …”
Get full text
Article