Search alternatives:
cars » care (Expand Search), car (Expand Search), sars (Expand Search)
checkers » checks (Expand Search), crackers (Expand Search), cheaters (Expand Search)
hackers » trackers (Expand Search)
cars » care (Expand Search), car (Expand Search), sars (Expand Search)
checkers » checks (Expand Search), crackers (Expand Search), cheaters (Expand Search)
hackers » trackers (Expand Search)
-
161
What are the intensities and line-shapes of the twenty four polarization terms in coherent anti-Stokes Raman spectroscopy?
Published 2015“…It is shown that in fs/ps CARS, for the two cases of off-resonance CARS in toluene and resonanceCARS in rhodamine 6G, where we use a fs pump pulse, a fs Stokes pulse and a ps probe pulse, we obtain sharp vibrational lines in four of the polarization terms where the pump and Stokes pulses can create a vibrational coherence on the ground electronic state, while the spectral line-shapes of the other twenty terms are broad and featureless. …”
Get full text
Get full text
Journal Article -
162
Driver fatigue detection from facial features
Published 2021“…The increase in demand for private cars has resulted in the rising number of cars on the road over the past 10 years. …”
Get full text
Final Year Project (FYP) -
163
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
164
Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t...
Published 2024“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Book -
165
GPU-accelerated real-time motion planning for safe human-robot collaboration
Published 2024“…We experimentally demonstrate that our method can navigate a 6-DoF robot earlier than a geometric-primitives-based distance checker in a dynamic, collaborative environment. …”
Get full text
Thesis-Doctor of Philosophy -
166
Automated tagging of safety cases for autonomous vehicles in Asian megacities
Published 2018“…For scenario analysis in Singapore, research cars collect vehicle data comprising information about the car as well as image data. …”
Get full text
Thesis -
167
Monitoring the drying process of glutinous rice using hyperspectral imaging coupled with multivariate analysis
Published 2024“…Therefore, the HSI coupled with multivariate analysis (CARS+PLS) is a potential technique for monitoring the drying process of glutinous rice on both small and industrial scales.…”
Get full text
Conference or Workshop Item -
168
Multi-sensor calibration and multi-modal perception for intelligent systems
Published 2022“…The main novelty is we propose to use the easy-to-obtain objects in the traffic for calibration (cars, trucks, buses, etc.). The essence is we observe that the 3D bounding box centers of the vehicles are viewpoint invariant. …”
Get full text
Thesis-Doctor of Philosophy -
169
Solar vehicle to grid simulation model
Published 2010“…However, manufacturers are investing and researching into green vehicles, electric cars being one of the cleaner and more efficient options. …”
Get full text
Final Year Project (FYP) -
170
Development of a wireless charging system for electric vehicles in Singapore
Published 2020“…The majority of the EVs in the market are currently using a plug-in charging port, and there are two types of design, one of which is the hybrid model. Hybrid cars have the advantage of a longer driving range as compared to conventional cars because they have a secondary source of energy. …”
Get full text
Final Year Project (FYP) -
171
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
172
What We Should Do Before the Social Bots Take Over: Online Privacy Protection and the Political Economy of Our Near Future
Published 2020“…U.S. states have passed laws to address self-driving cars on public roads (Marcus 2012). And nearer the subject of this paper, the legality of search engine bots (web crawlers) has been openly questioned on grounds of intellectual property protection and trespassing (Plitch 2002). …”
Get full text
Presentation -
173
Lane-aware image enhancement for lane detection in rain (part A)
Published 2022“…At the same time, we may be able to use keypoint maps to test images, such as CornerNet, CenterNet and other algorithms.…”
Get full text
Thesis-Master by Coursework -
174
NEGOTIATE your way to RICHES /
Published 2003“…Peter's techniques can be used to buy cars and homes, from business partnerships, bargain with contractors, or anything else. …”
text -
175
Vehicle energy systems for autonomous driving
Published 2020“…In 2018, Shell added an autonomous category to the competition that requires the cars in competition to complete five challenges. …”
Get full text
Final Year Project (FYP) -
176
On the corrosion resistance of some selective laser melted alloys
Published 2021“…The effects of laser scanning strategy (single melt vs. checker board styles), post-SLM heat treatment, and corroding surface orientation (with respect to the scan and build directions) on the corrosion behavior were examined. …”
Get full text
Journal Article -
177
Development of an industrial SCADA firewall prototype using single board computer - part 2
Published 2019“…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
Get full text
Final Year Project (FYP) -
178
Encrypted smartphone with advanced encryption standard 256
Published 2011“…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
Get full text
Final Year Project (FYP) -
179
Smart-contract privacy preservation mechanism
Published 2023“…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
Get full text
Article -
180
Safety at road junctions
Published 2015“…This suggests that the number of traffic fatalities may reduce if most motorcyclists had traveled in a safer manner, as well as cars and heavy goods vehicles.…”
Get full text
Final Year Project (FYP)