Search alternatives:
apal » kapal (Expand Search), apa (Expand Search), appl (Expand Search)
same » some (Expand Search)
papa » pada (Expand Search), apa (Expand Search), bapa (Expand Search)
para » part (Expand Search), pada (Expand Search), park (Expand Search)
apal » kapal (Expand Search), apa (Expand Search), appl (Expand Search)
same » some (Expand Search)
papa » pada (Expand Search), apa (Expand Search), bapa (Expand Search)
para » part (Expand Search), pada (Expand Search), park (Expand Search)
-
41
Cycle-based trading & portfolio management system
Published 2016“…This research project aims to apply machine learning techniques in the area of financial investment. …”
Get full text
Final Year Project (FYP) -
42
A vision based system for modern transportation system
Published 2019“…By doing so, we can use it as part of the tools to catch drivers that are speeding. Similarly, we can apply the same concept for traffic signages which enable vehicles to identify the various traffic signages and inform the driver accordingly. …”
Get full text
Final Year Project (FYP) -
43
The electrochemistry of metalloenzymes confined in ionic liquids
Published 2016“…CO2 reduction and CO oxidation electrocatalysed by CODH I<sub><em>Ch</em></sub> occurred at the same time in the tiny aqueous shell, according to cyclic voltammetry. …”
Thesis -
44
HPC simulations of information propagation over complex networks
Published 2015“…High Performance Computing (HPC) is a technology that may be used to apply optimized algorithms on powerful new hardware resources for accelerating execution performance. …”
Get full text
Thesis -
45
Simulation Tools for Inclusive Design Solutions
Published 2024“…This was achieved using different tools that simulate the same physical restriction. In this study, a noise- canceller and earphones were used to simulate a reduced hearing attention. …”
Get full text
Article -
46
Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks
Published 2024“…Since fine-tuning has little effect on model parameters, the fine-tuned model will retain the backdoor functionality and predict a specific label for the samples embedded with the same trigger. To provoke multiple labels in a specific task, attackers can introduce several triggers with predefined contrastive values. …”
Get full text
Article -
47
Heat of hydration, bleeding, viscosity, setting of Ca(OH)<inf>2</inf>-GGBS and MgO-GGBS grouts
Published 2022“…Compared with the PC grout, the pure GGBS grout with the same W/C ratio demonstrated higher bleeding and setting time, and lower heat rate and viscosity. …”
Get full text
Journal Article -
48
Long-Term Tracking Mesenchymal Stem Cell Differentiation with Photostable Fluorescent Nanoparticles
Published 2017“…Specifically, we found that the PCL-DPP-PCL labeling was unfavorable to the MSC osteogenic differentiation, whereas the labeled MSCs exhibited the same adipogenic and chondrogenic differentiations compared to the unlabeled controls as verified by gene expressions and histological staining. …”
Get full text
Get full text
Journal Article -
49
-
50
-
51
Environmental and human data-driven model based on machine learning for prediction of human comfort
Published 2020“…To validate the predication performance of this method, we have applied the other six popular machine learning models on the same dataset. …”
Get full text
Journal Article -
52
Semantic segmentation with less annotation efforts
Published 2020“…Thus, it is difficult to apply the segmentation methods to new datasets or semantic classes since it is labor-intensive to obtain new annotated data. …”
Get full text
Thesis-Doctor of Philosophy -
53
Efficient public key encryption with equality test in the standard model
Published 2020“…Public key encryption with equality test (PKEET) is a special kind of public encryption scheme (PKE) that allows a tester to perform equality tests on ciphertexts generated by different public keys as well as the same public key. This feature enables us to apply PKEET to various scenarios in practice, such as efficient data management on encrypted databases and spam filtering in encrypted email systems. …”
Get full text
Journal Article -
54
Supply chain performance with target-oriented firms
Published 2022“…With the firms’ target-oriented behavior evaluated by a CVaR-satisficing measure, we apply a game theoretical framework to investigate how the target-based preference affects supply chain performance. …”
Get full text
Journal Article -
55
Hybrid lasers and modulator on silicon in the near- and mid-infrared region
Published 2017“…The tremendous developments of the silicon photonics nowadays make it possible to build a series of powerful components within the same chip. The use of the advanced Complimentary-metal-oxide-semiconductor (CMOS) technology opens up many possibilities for new applications including the communications, processing and displays, etc., which is traditionally limited by the electronic interconnect. …”
Get full text
Thesis -
56
Three essays on corporate finance
Published 2017“…The above pattern remains robust if we apply various matching schemes or if we only look at the transitory cash flow shock. …”
Get full text
Thesis -
57
Object mining using a matching graph on very large image collections
Published 2009“…Often, what is required is that images taken in the same place, of the same thing, or of the same person be conceptually grouped together. …”
Conference item -
58
Patient-Centered Clinical Trial Design for Heart Failure Devices via Bayesian Decision Analysis
Published 2023“…Abstract Background The statistical significance of clinical trial outcomes is generally interpreted quantitatively according to the same threshold of 2.5% (in one-sided tests) to control the false-positive rate or type I error, regardless of the burden of disease or patient preferences. …”
Get full text
Article -
59
-
60
Classification of second order partial differential equation using maple and comparison for the solutions
Published 2015“…Graphical comparisons indicated that the methods are the same. In the same way, the PDE’s with variable coefficient are solved by double Laplace transforms methods. …”
Get full text
Thesis