Search alternatives:
pingned » pinned (Expand Search), pinggned (Expand Search), spingned (Expand Search)
linge » line (Expand Search), ling (Expand Search), hinge (Expand Search)
ming » min (Expand Search), ling (Expand Search)
hinged » hinges (Expand Search), hinge (Expand Search)
sping » spin (Expand Search), shing (Expand Search), swing (Expand Search), spingg (Expand Search), ssping (Expand Search)
pin » ping (Expand Search), spin (Expand Search)
link » line (Expand Search)
pingned » pinned (Expand Search), pinggned (Expand Search), spingned (Expand Search)
linge » line (Expand Search), ling (Expand Search), hinge (Expand Search)
ming » min (Expand Search), ling (Expand Search)
hinged » hinges (Expand Search), hinge (Expand Search)
sping » spin (Expand Search), shing (Expand Search), swing (Expand Search), spingg (Expand Search), ssping (Expand Search)
pin » ping (Expand Search), spin (Expand Search)
link » line (Expand Search)
-
2441
-
2442
Risk management framework for construction project managers
Published 2024Get full text
Thesis-Master by Coursework -
2443
Data analytics accessibility and predictability in Singapore’s rail sector
Published 2024Get full text
Final Year Project (FYP) -
2444
Data processing and visualization for real-time health monitoring
Published 2014Get full text
Final Year Project (FYP) -
2445
-
2446
Exploring the (im)possibilities of multicultural solidarity in Singapore
Published 2015Get full text
Final Year Project (FYP) -
2447
-
2448
-
2449
Fabrication and characterization of flexible-conductive nanocomposites
Published 2016Get full text
Final Year Project (FYP) -
2450
-
2451
Fabrication of newspaper-based nickel cobaltite nanosheet supercapacitor
Published 2018Get full text
Final Year Project (FYP) -
2452
-
2453
Surface plasmon enhanced thermal properties of noble metallic nanofluids
Published 2011Get full text
Get full text
Journal Article -
2454
Data Analytics for Cybersecurity /
Published 2022“…Data is a common thread linking various types of devices and end users. Analyzing data across different segments of cybersecurity domains, particularly data generated during cyber-attacks, can help us understand threats better, prevent future cyber-attacks, and provide insights into the evolving cyber threat landscape. …”
Get full text
software, multimedia -
2455
Circulating current control scheme of modular multilevel converters supplying passive networks under unbalanced load conditions
Published 2020“…Load imbalances in the supply of passive loads with modular multilevel converter (MMC)-based medium (MVDC) and high voltage (HVDC) dc-links are inevitable. In such applications, the maximum-allowable voltage ripples and peak arm currents define the operating limits of the MMCs. …”
Get full text
Journal Article -
2456
Analysis of V2X communications
Published 2015“…Due to certain limitations of the Matlab – Vissim Com interface, there are some features like the auto-generation of the road links cannot be done. This called for the manual-generating of the road links of the NTU campus map. …”
Get full text
Final Year Project (FYP) -
2457
Markers of synovial inflammation in cohorts at risk of knee osteoarthritis
Published 2016“…Additionally, it is possibly linked with premature mortality. Low-grade inflammation is associated with a high risk of non-traumatic KOA incidence but also with metabolic syndrome. …”
Thesis -
2458
Ventricular volume asymmetry as a novel imaging biomarker for disease discrimination and outcome prediction
Published 2024“…Clinical outcomes were defined through linked health records. Incident events were those occurring for the first time after imaging, longitudinally tracked over an average follow-up time of 4.75 ± 1.52 years. …”
Journal article -
2459
Pronoun drop and prosocial behavior : experimental evidence from Japan
Published 2020“…Given that our results provide little empirical support for previous research findings linking first-person pronoun use and lower pro-sociality, we prescribe caution in using languages as a proxy for culture in several cross-country empirical studies in economics.…”
Get full text
Journal Article -
2460
Facial spoofing indicator using deep learning
Published 2022“…Out of all the biometric verification, facial biometric verification is the most common. Facial biometric is linked with an increase in vulnerability to facial spoofing attacks as it is easy to acquire individuals’ photos from platforms such as social media or Google. …”
Get full text
Final Year Project (FYP)