Search alternatives:
car » coar (Expand Search), care (Expand Search)
heaters » heater (Expand Search)
hackers » trackers (Expand Search)
Showing 381 - 400 results of 584 for search '((car OR (heaters OR hackers)) OR (checker OR checked))', query time: 0.14s Refine Results
  1. 381

    Attack detection for cyber-physical systems: a zonotopic approach by Li, Jitao, Wang, Zhenhua, Shen, Yi, Xie, Lihua

    Published 2023
    “…Two approaches, namely, projection and polytopic conversion, are presented to check the intersection situation. The detection performance is quantified using a stealthy attack set and the corresponding state estimation error set. …”
    Get full text
    Journal Article
  2. 382

    Petri net-based efficient determination of optimal schedules for transport-dominant single-arm multi-cluster tools by Yang, Fajun, Wu, Naiqi, Qiao, Yan, Zhou, Mengchu, Su, Rong., Qu, Ting

    Published 2018
    “…Thereafter, an efficient algorithm is developed to check the given conditions and find such a schedule efficiently if existing. …”
    Get full text
    Get full text
    Journal Article
  3. 383

    Tournaments of financial analysts by Yin, Huifang, Zhang, Huai

    Published 2013
    “…This finding survives several robustness checks and is more pronounced when the interim assessment date is closer to the end of the tournament period, when analysts are inexperienced, and when the market activity is high. …”
    Get full text
    Get full text
    Journal Article
  4. 384

    HFP 303E - Asian Thought: Indian, Chinese, And Japanese June 2016 by PPIK, Pusat Pengajian Ilmu Kemanusiaan

    Published 2016
    “…Please check that this examination paper consists of FOUR pages of printed material before you begin the examination. …”
    Get full text
    Teaching Resource
  5. 385

    Implementation of Dijkstra's shortest path algorithm for vehicle routing by Pang, Jacquelyn Jiaqi

    Published 2017
    “…However, to simulate specific conditions, it requires MATLAB (COM programming) to give specific commands to the cars in VISSIM. My project is to implement Dijkstra’s algorithms via COM programming to find the shortest path between any two locations.…”
    Get full text
    Final Year Project (FYP)
  6. 386

    Autonomised harming by Eggert, L

    Published 2023
    “…This paper sketches elements of a theory of the ethics of autonomised harming: the phenomenon of delegating decisions about whether and whom to harm to artificial intelligence (AI) in self-driving cars and autonomous weapon systems. First, the paper elucidates the challenge of integrating non-human, artificial agents, which lack rights and duties, into our moral framework which relies on precisely these notions to determine the permissibility of harming. …”
    Journal article
  7. 387

    A boundary-fragment-model for object detection by Opelt, A, Pinz, A, Zisserman, A

    Published 2006
    “…</p> <p>We demonstrate the following results: (i) the BFM detector is able to represent and detect object classes principally defined by their shape, rather than their appearance; and (ii) in comparison with other published results on several object classes (airplanes, cars-rear, cows) the BFM detector is able to exceed previous performances, and to achieve this with less supervision (such as the number of training images).…”
    Conference item
  8. 388

    Development of software testing and analysis tools : Part A by Ng, Qing Xiang.

    Published 2009
    “…The patterns are: • Identical/Compliment-Decision Pattern • Mutually-Exclusive-Decision Pattern • Check-then-Do Pattern • Loop-by-Flag Pattern The scope of this project is to create a set of tools to facilitate detecting of such infeasible paths by detecting the conditions that fulfill the patterns mentioned above. …”
    Get full text
    Final Year Project (FYP)
  9. 389

    The application of microtremor survey method in investigating the geological formation of Singapore by Muhammad Azri Bin Omar.

    Published 2011
    “…A comparison between the results obtained from SPAC analysis as well as borehole information will also be shown to check for consistency.…”
    Get full text
    Final Year Project (FYP)
  10. 390

    Recommendation in location based social networks by Chen, Long.

    Published 2013
    “…Temporal information in check-ins which interconnects users and point-of-interests have significant value in LBSNs. …”
    Get full text
    Final Year Project (FYP)
  11. 391

    Design and development of a robot invigilator by Wu, Xiangran.

    Published 2013
    “…By applying this technology, the robot invigilator can do what a traditional invigilator need to do during an examination such like, timing for the duration, checking the attendance face-to-face. A backend exam registration system also has been developed to simulate the real case. …”
    Get full text
    Final Year Project (FYP)
  12. 392

    Target detection in stationary background by Liu, Lu.

    Published 2013
    “…The basic principle of target detection is to compare the current image with a reference image which is call the background image, from the comparison result to define whether there is a moving target in the image by checking the changing in the image, pixel by pixel. …”
    Get full text
    Final Year Project (FYP)
  13. 393

    Report on industrial attachment with Autodesk Asia Private Limited by Zhu, Chenyang

    Published 2015
    “…Few projects were undertaken during the internship at Autodesk including porting Memento to Mac OS X, add check video update functionality to Memento, Mesh Segmentation using OpenCL and design and implementation of Large Mesh Web Viewer. …”
    Get full text
    Final Year Project (FYP)
  14. 394

    Investigating growth and properties of perovskite single crystals by Tan, Kok Ho

    Published 2018
    “…X-ray diffraction was conducted to check the purity of methylammonium lead bromide perovskite crystals grown. …”
    Get full text
    Final Year Project (FYP)
  15. 395

    Influence of non-linear wave load models on monopile supported offshore wind turbines for extreme conditions by Ryan, GV, Tang, T, McAdam, RA, Adcock, TAA

    Published 2025
    “…These models are compared to the widely used constrained wave approach, showing that significant differences are predicted for steel and geotechnical design checks. This suggests that the industry standard approach may be inappropriate for the design of monopile structures against extreme wave loads.…”
    Journal article
  16. 396

    Symbolic verification and strategy synthesis for turn-based stochastic games by Kwiatkowska, M, Norman, G, Parker, D, Santos, G

    Published 2022
    “…Probabilistic model checking techniques for this class of models allow us to formally specify quantitative specifications of either collective or individual behaviour and then automatically synthesise strategies for the agents under which these specifications are guaranteed to be satisfied. …”
    Book section
  17. 397

    Globalization : Perak's Rise, Relative Decline, and Regeneration / by Nazrin Shah Ibni Sultan Azlan Muhibbuddin Shah, Sultan, 543480, Oxford University Press (Online service) 655242

    Published 2024
    “…Likewise, during the global rubber boom that began in the early 20th century as cars were mass-produced for the first time, Perak was the largest rubber-producing state in the peninsula. …”
    Get full text
    software, multimedia
  18. 398

    Active Learning for Inference and Regeneration of Applications that Access Databases by Shen, Jiasi, Rinard, Martin

    Published 2025
    “…Konure also implements a regenerator that produces a translated Python implementation of the application that systematically includes relevant security and error checks.…”
    Get full text
    Article
  19. 399

    Blind recognition of LDPC code parameters over erroneous channel conditions by Ramabadran, Swaminathan, Madhukumar, A. S., Wang, Guohua, Ting, Shang Kee

    Published 2020
    “…In this study, blind estimation algorithms are proposed to identify code dimension and codeword length parameters of low-density parity-check (LDPC) codes at the receiver over noisy or erroneous channel conditions assuming a non-cooperative scenario. …”
    Get full text
    Journal Article
  20. 400

    Developing of innovative and cool mobile applications on the Googles Android powered devices 5 by Arun Mohan

    Published 2014
    “…Sports Info is tailored to meet the expectations of smart phone users who regularly checks sports updates like match schedules, score card and important sports news.…”
    Get full text
    Final Year Project (FYP)