Search alternatives:
car » coar (Expand Search), care (Expand Search)
heaters » heater (Expand Search)
hackers » trackers (Expand Search)
car » coar (Expand Search), care (Expand Search)
heaters » heater (Expand Search)
hackers » trackers (Expand Search)
-
381
Attack detection for cyber-physical systems: a zonotopic approach
Published 2023“…Two approaches, namely, projection and polytopic conversion, are presented to check the intersection situation. The detection performance is quantified using a stealthy attack set and the corresponding state estimation error set. …”
Get full text
Journal Article -
382
Petri net-based efficient determination of optimal schedules for transport-dominant single-arm multi-cluster tools
Published 2018“…Thereafter, an efficient algorithm is developed to check the given conditions and find such a schedule efficiently if existing. …”
Get full text
Get full text
Journal Article -
383
Tournaments of financial analysts
Published 2013“…This finding survives several robustness checks and is more pronounced when the interim assessment date is closer to the end of the tournament period, when analysts are inexperienced, and when the market activity is high. …”
Get full text
Get full text
Journal Article -
384
HFP 303E - Asian Thought: Indian, Chinese, And Japanese June 2016
Published 2016“…Please check that this examination paper consists of FOUR pages of printed material before you begin the examination. …”
Get full text
Teaching Resource -
385
Implementation of Dijkstra's shortest path algorithm for vehicle routing
Published 2017“…However, to simulate specific conditions, it requires MATLAB (COM programming) to give specific commands to the cars in VISSIM. My project is to implement Dijkstra’s algorithms via COM programming to find the shortest path between any two locations.…”
Get full text
Final Year Project (FYP) -
386
Autonomised harming
Published 2023“…This paper sketches elements of a theory of the ethics of autonomised harming: the phenomenon of delegating decisions about whether and whom to harm to artificial intelligence (AI) in self-driving cars and autonomous weapon systems. First, the paper elucidates the challenge of integrating non-human, artificial agents, which lack rights and duties, into our moral framework which relies on precisely these notions to determine the permissibility of harming. …”
Journal article -
387
A boundary-fragment-model for object detection
Published 2006“…</p> <p>We demonstrate the following results: (i) the BFM detector is able to represent and detect object classes principally defined by their shape, rather than their appearance; and (ii) in comparison with other published results on several object classes (airplanes, cars-rear, cows) the BFM detector is able to exceed previous performances, and to achieve this with less supervision (such as the number of training images).…”
Conference item -
388
Development of software testing and analysis tools : Part A
Published 2009“…The patterns are: • Identical/Compliment-Decision Pattern • Mutually-Exclusive-Decision Pattern • Check-then-Do Pattern • Loop-by-Flag Pattern The scope of this project is to create a set of tools to facilitate detecting of such infeasible paths by detecting the conditions that fulfill the patterns mentioned above. …”
Get full text
Final Year Project (FYP) -
389
The application of microtremor survey method in investigating the geological formation of Singapore
Published 2011“…A comparison between the results obtained from SPAC analysis as well as borehole information will also be shown to check for consistency.…”
Get full text
Final Year Project (FYP) -
390
Recommendation in location based social networks
Published 2013“…Temporal information in check-ins which interconnects users and point-of-interests have significant value in LBSNs. …”
Get full text
Final Year Project (FYP) -
391
Design and development of a robot invigilator
Published 2013“…By applying this technology, the robot invigilator can do what a traditional invigilator need to do during an examination such like, timing for the duration, checking the attendance face-to-face. A backend exam registration system also has been developed to simulate the real case. …”
Get full text
Final Year Project (FYP) -
392
Target detection in stationary background
Published 2013“…The basic principle of target detection is to compare the current image with a reference image which is call the background image, from the comparison result to define whether there is a moving target in the image by checking the changing in the image, pixel by pixel. …”
Get full text
Final Year Project (FYP) -
393
Report on industrial attachment with Autodesk Asia Private Limited
Published 2015“…Few projects were undertaken during the internship at Autodesk including porting Memento to Mac OS X, add check video update functionality to Memento, Mesh Segmentation using OpenCL and design and implementation of Large Mesh Web Viewer. …”
Get full text
Final Year Project (FYP) -
394
Investigating growth and properties of perovskite single crystals
Published 2018“…X-ray diffraction was conducted to check the purity of methylammonium lead bromide perovskite crystals grown. …”
Get full text
Final Year Project (FYP) -
395
Influence of non-linear wave load models on monopile supported offshore wind turbines for extreme conditions
Published 2025“…These models are compared to the widely used constrained wave approach, showing that significant differences are predicted for steel and geotechnical design checks. This suggests that the industry standard approach may be inappropriate for the design of monopile structures against extreme wave loads.…”
Journal article -
396
Symbolic verification and strategy synthesis for turn-based stochastic games
Published 2022“…Probabilistic model checking techniques for this class of models allow us to formally specify quantitative specifications of either collective or individual behaviour and then automatically synthesise strategies for the agents under which these specifications are guaranteed to be satisfied. …”
Book section -
397
Globalization : Perak's Rise, Relative Decline, and Regeneration /
Published 2024“…Likewise, during the global rubber boom that began in the early 20th century as cars were mass-produced for the first time, Perak was the largest rubber-producing state in the peninsula. …”
Get full text
software, multimedia -
398
Active Learning for Inference and Regeneration of Applications that Access Databases
Published 2025“…Konure also implements a regenerator that produces a translated Python implementation of the application that systematically includes relevant security and error checks.…”
Get full text
Article -
399
Blind recognition of LDPC code parameters over erroneous channel conditions
Published 2020“…In this study, blind estimation algorithms are proposed to identify code dimension and codeword length parameters of low-density parity-check (LDPC) codes at the receiver over noisy or erroneous channel conditions assuming a non-cooperative scenario. …”
Get full text
Journal Article -
400
Developing of innovative and cool mobile applications on the Googles Android powered devices 5
Published 2014“…Sports Info is tailored to meet the expectations of smart phone users who regularly checks sports updates like match schedules, score card and important sports news.…”
Get full text
Final Year Project (FYP)