Showing 161 - 180 results of 1,620 for search '((cars OR (center OR (checkers OR hackers))) OR (checker OR checked))', query time: 0.16s Refine Results
  1. 161

    What are the intensities and line-shapes of the twenty four polarization terms in coherent anti-Stokes Raman spectroscopy? by Niu, Kai, Lee, Soo-Ying

    Published 2015
    “…It is shown that in fs/ps CARS, for the two cases of off-resonance CARS in toluene and resonanceCARS in rhodamine 6G, where we use a fs pump pulse, a fs Stokes pulse and a ps probe pulse, we obtain sharp vibrational lines in four of the polarization terms where the pump and Stokes pulses can create a vibrational coherence on the ground electronic state, while the spectral line-shapes of the other twenty terms are broad and featureless. …”
    Get full text
    Get full text
    Journal Article
  2. 162

    Driver fatigue detection from facial features by Tee, Hui Qian

    Published 2021
    “…The increase in demand for private cars has resulted in the rising number of cars on the road over the past 10 years. …”
    Get full text
    Final Year Project (FYP)
  3. 163

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  4. 164

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  5. 165

    GPU-accelerated real-time motion planning for safe human-robot collaboration by Fujii, Shohei

    Published 2024
    “…We experimentally demonstrate that our method can navigate a 6-DoF robot earlier than a geometric-primitives-based distance checker in a dynamic, collaborative environment. …”
    Get full text
    Thesis-Doctor of Philosophy
  6. 166

    Automated tagging of safety cases for autonomous vehicles in Asian megacities by Srivastava Prateek

    Published 2018
    “…For scenario analysis in Singapore, research cars collect vehicle data comprising information about the car as well as image data. …”
    Get full text
    Thesis
  7. 167

    Monitoring the drying process of glutinous rice using hyperspectral imaging coupled with multivariate analysis by Jimoh, Kabiru Ayobami, Hashim, Norhashila, Shamsudin, Rosnah, Che Man, Hasfalina, Jahari, Mahirah

    Published 2024
    “…Therefore, the HSI coupled with multivariate analysis (CARS+PLS) is a potential technique for monitoring the drying process of glutinous rice on both small and industrial scales.…”
    Get full text
    Conference or Workshop Item
  8. 168

    Multi-sensor calibration and multi-modal perception for intelligent systems by Zhang, Jun

    Published 2022
    “…The main novelty is we propose to use the easy-to-obtain objects in the traffic for calibration (cars, trucks, buses, etc.). The essence is we observe that the 3D bounding box centers of the vehicles are viewpoint invariant. …”
    Get full text
    Thesis-Doctor of Philosophy
  9. 169

    Solar vehicle to grid simulation model by Lim, Yihn Shin.

    Published 2010
    “…However, manufacturers are investing and researching into green vehicles, electric cars being one of the cleaner and more efficient options. …”
    Get full text
    Final Year Project (FYP)
  10. 170

    Development of a wireless charging system for electric vehicles in Singapore by Ang, Jia Yu

    Published 2020
    “…The majority of the EVs in the market are currently using a plug-in charging port, and there are two types of design, one of which is the hybrid model. Hybrid cars have the advantage of a longer driving range as compared to conventional cars because they have a secondary source of energy. …”
    Get full text
    Final Year Project (FYP)
  11. 171

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  12. 172

    What We Should Do Before the Social Bots Take Over: Online Privacy Protection and the Political Economy of Our Near Future by Graeff, Erhardt

    Published 2020
    “…U.S. states have passed laws to address self-driving cars on public roads (Marcus 2012). And nearer the subject of this paper, the legality of search engine bots (web crawlers) has been openly questioned on grounds of intellectual property protection and trespassing (Plitch 2002). …”
    Get full text
    Presentation
  13. 173

    Lane-aware image enhancement for lane detection in rain (part A) by Zeng, Lanning

    Published 2022
    “…At the same time, we may be able to use keypoint maps to test images, such as CornerNet, CenterNet and other algorithms.…”
    Get full text
    Thesis-Master by Coursework
  14. 174

    NEGOTIATE your way to RICHES / by Wink, Peter, 1966-, author 655681

    Published 2003
    “…Peter's techniques can be used to buy cars and homes, from business partnerships, bargain with contractors, or anything else. …”
    text
  15. 175

    Vehicle energy systems for autonomous driving by Goh, Daniel Jun Hao

    Published 2020
    “…In 2018, Shell added an autonomous category to the competition that requires the cars in competition to complete five challenges. …”
    Get full text
    Final Year Project (FYP)
  16. 176

    On the corrosion resistance of some selective laser melted alloys by Suryawanshi, Jyoti, Baskaran, T., Prakash, Om, Arya, S. B., Ramamurty, Upadrasta

    Published 2021
    “…The effects of laser scanning strategy (single melt vs. checker board styles), post-SLM heat treatment, and corroding surface orientation (with respect to the scan and build directions) on the corrosion behavior were examined. …”
    Get full text
    Journal Article
  17. 177

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)
  18. 178

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
    Get full text
    Final Year Project (FYP)
  19. 179

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article
  20. 180

    Safety at road junctions by Han, Jia Min

    Published 2015
    “…This suggests that the number of traffic fatalities may reduce if most motorcyclists had traveled in a safer manner, as well as cars and heavy goods vehicles.…”
    Get full text
    Final Year Project (FYP)