Search alternatives:
kapal » kamal (Expand Search)
name » named (Expand Search), same (Expand Search), game (Expand Search)
papa » apa (Expand Search), bapa (Expand Search), paa (Expand Search)
para » part (Expand Search), park (Expand Search)
kapal » kamal (Expand Search)
name » named (Expand Search), same (Expand Search), game (Expand Search)
papa » apa (Expand Search), bapa (Expand Search), paa (Expand Search)
para » part (Expand Search), park (Expand Search)
-
21
Limits to extreme event forecasting in chaotic systems
Published 2024“…Some examples include weather forecasting, traffic management, power grid operations, and financial market analysis, to name a few. Methods of increasing sophistication have been developed to forecast events in these systems. …”
Get full text
Get full text
Thesis -
22
Microsoft kinect for early education
Published 2013“…“Kinedu” which means “Kinect for Education” was used as the project name. Kinedu consists of two parts, Kinedu Client and Kinedu Content Creator. …”
Get full text
Final Year Project (FYP) -
23
Unsupervised bayesian generative methods
Published 2016“…First, in a scenario of disambiguating different academic authors with the same name, a central problem is to determine the probability whether two sets of publication are authored by the same person, based on categorical features of the publications, such as coauthor names and publication venues. …”
Get full text
Thesis -
24
Organisational environment for innovation : the case of Singapore electronics industry
Published 2009“…The purpose of this study is to determine the organisational factors that affect innovation and then apply knowledge gained to investigate the general organisational environment in Singapore electronics industry. …”
Get full text
Thesis -
25
Evaluation of Value at Risk (VaR) using extreme value theory in Asian four tigers.
Published 2008“…Value at Risk (VaR) is widely applied in finance for quantitative risk management for many types of risks in the market. …”
Get full text
Final Year Project (FYP) -
26
Cryptanalysis of symmetric-key primitives and its application to backdoor design
Published 2021“…A concrete instantiation of this framework named LowMC-M is then proposed.…”
Get full text
Thesis-Doctor of Philosophy -
27
36 stratagems & applications
Published 2020“…With strong belief in the possibility to co-relate the Chinese’s ancient strategies applied in warfare with tactical strategies in modern world, it was explored to formulate these stratagems such that the stratagems can be further utilized in modern application fields, including politics, economics, trading or anywhere one names it with win or loss involves or even averse loss and maintain healthy win.…”
Get full text
Final Year Project (FYP) -
28
HPC simulations of information propagation over complex networks
Published 2015“…High Performance Computing (HPC) is a technology that may be used to apply optimized algorithms on powerful new hardware resources for accelerating execution performance. …”
Get full text
Thesis -
29
Slide-and-Read: Making Sense of Reading using Cognitive Support Application and Tool (S/O 14334)
Published 2021“…Inspired by the success of our tangible manipulative, also named Slide-and-Read, we took the initiative to apply the same concept and design to develop a digital artefact of the said manipulative. …”
Get full text
Monograph -
30
Principles : Life and Work /
Published 2017“…Dalio himself has been named to Time magazine's list of the 100 most influential people in the world. …”
Get full text
software, multimedia -
31
Gender-based multi-aspect sentiment detection using multilabel learning
Published 2022“…Next, we apply problem transformation approaches and multichannel recurrent neural networks with attention mechanism. …”
Get full text
Journal Article -
32
Equalities in education outcomes in Korea, Sweden and Norway
Published 2007“…The percentage considered “unable to apply basic mathematical knowledge” varies from 10 per cent in Korea to 45 per cent or more in Denmark and Norway. …”
Thesis -
33
Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks
Published 2024“…Our findings sound a red alarm for the wide use of pre-trained models. Finally, we apply several defense methods to NeuBA and find that model pruning is a promising technique to resist NeuBA by omitting backdoored neurons.…”
Get full text
Article -
34
Recovery of Herschel-Bulkley Fluid Parameters from Video via Differentiable Simulations
Published 2024“…Our approach aims to accurately recover physical parameters and achieve high-fidelity 3D reconstructions from single-view videos of fluids, even those with complex rheological behaviors like shear thinning and thickening. In this study, we apply our method to a Herschel-Bulkley fluid, namely ketchup, under two different real-world conditions: a 50mm column collapse and being squeezed from a bottle. …”
Get full text
Thesis -
35
Laplace transforms, non-analytic growth bounds and $C_{0}$-semigroups
Published 2002“…We study the properties of $\zeta(f)$ as well as two associated abscissas, namely the non-analytic abscissa of convergence, $\zeta_{1}(f)$ and the non-analytic abscissa of absolute convergence $\kappa(f)$. …”
Thesis -
36
HDSKG: Harvesting domain specific knowledge graph from content of webpages
Published 2017“…In this research, an automatic method named HDSKG is proposed to discover domain specific concepts and their relation triples from the content of webpages. …”
Get full text
Get full text
Conference Paper -
37
Development of novel chemical ligation methods for the synthesis of posttranslationally modified proteins
Published 2012“…In chapter 4, we modify and improve our dual chemical ligation approach and apply it in the synthesis of a K48-linked diubiquitin. …”
Get full text
Thesis -
38
新移民的跨国实践和离散论述 :孙侠(铃铛)个案研究 = Transnational practice and diasporic discourses of new immigrant : a case study on Sun Xia (Ling Dang)
Published 2017“…Sun Xia is also a poet whom goes by the pen name, Ling Dang. Through her works, she represents a unique diasporic group with multiple identities who identifies with two cultures under the transnational experience. …”
Get full text
Final Year Project (FYP) -
39
-
40
Active learning with applications in biomedical document annotation
Published 2017“…The proposed method fur- ther deals with unknown words in test data by using word similarity measures. We also apply our active learning method for the task of named entity recognition. …”
Get full text
Thesis