Showing 3,501 - 3,520 results of 7,746 for search '((pinnau OR fine) OR (((pina OR (peng OR lin)) OR spinal) OR (line OR (life OR like))))', query time: 0.22s Refine Results
  1. 3501

    A supervised two-channel learning method for hidden Markov model and application on lip reading by Foo, Say Wei, Dong, Liang

    Published 2009
    “…This method is specially designed to train HMMs for fine recognition from similar observations. The prominent features of this method are 1.) the criterion function is based on the difference between training sequences, and 2.) a twochannel structure is adopted to maintain the validity of the HMM. …”
    Get full text
    Get full text
    Conference Paper
  2. 3502

    Elastic modulus, hardness and creep performance of SnBi alloys using nanoindentation by Shen, Lu, Septiwerdani, Pradita, Chen, Zhong

    Published 2013
    “…At the intermediate stress region (200–370 MPa), dislocation climb is the dominant creep mechanism with stress exponents around 5–8. When fine lamellar structure is the dominant constituent of the microstructure, phase boundary sliding is identified as the rate-controlling mechanism in the low stress region (<200 MPa).…”
    Get full text
    Get full text
    Journal Article
  3. 3503

    Knowledge-based reactive planning and re-planning – a case-study approach by Djemai, Ramzi, Vassilev, Vassil, Ouazzane, Karim, Dey, Maitreyee

    Published 2024
    “…Planning for uncertainties arising from indoor evacuations can be complex as there’s a fine balance to strike between a too-detailed plan and one that’s too vague. …”
    Get full text
    Conference or Workshop Item
  4. 3504

    Vision-language modelling for radiological imaging and reports in the low data regime by Windsor, R, Jamaludin, A, Kadir, T, Zisserman, A

    Published 2024
    “…Combined, they significantly improve retrieval compared to fine-tuning CLIP, roughly equivalent to training with 10x the data. …”
    Conference item
  5. 3505

    A comparative analysis of missing data imputation techniques on sedimentation data by Loh, Wing Son, Ling, Lloyd, Chin, Ren Jie, Lai, Sai Hin, Loo, Kar Kuan, Seah, Choon Sen

    Published 2024
    “…A comparative analysis on the missing fine sediment data imputation performance was made based on four different techniques, namely the k-Nearest Neighbourhood (k-NN), Support Vector Regression (SVR), Multiple Regression (MR), and Artificial Neural Network (ANN), under the single imputation (SI) and multiple imputation (MI) regimes. …”
    Get full text
    Article
  6. 3506
  7. 3507

    Relationship between synoptic scale meteorology, aircraft parameters, and observable contrails by Barbosa, Maria Paula

    Published 2024
    “…Long-lasting or "persistent" contrails are line-shaped clouds that form when airplanes fly through cold and humid parts of the atmosphere that are ice-supersaturated. …”
    Get full text
    Thesis
  8. 3508
  9. 3509

    Public bus transit service modeling and optimization: from conventional to autonomous vehicles by Tian, Qingyun

    Published 2022
    “…In the first part, this thesis proposes a novel tri-level model for a transit service operation design problem that primarily determines the optimal bus line frequency setting. Unlike the existing studies, the strategy choices of passengers in presence of congested common lines are explicitly considered. …”
    Get full text
    Thesis-Doctor of Philosophy
  10. 3510

    Anti-leukaemic and chemotherapy supportive effects of berberis vulgaris l. Fruit crude extract on in vitro and in vivo models by Saedi, Tayebeh Azam

    Published 2015
    “…For the in vitro method, cytotoxic effects of BVFCE were evaluated using MTT assay to determine the IC50 values and compare with non-leukaemic cell line (The 3T3 cell). Observation of the morphological changes in the treated leukaemic cell lines with BVFCE and Doxorubicin (Doxo) was examined using inverted microscope. …”
    Get full text
    Thesis
  11. 3511

    REVENGE IN VIOLENT HUES / by Nadiah Zakaria, author 655918

    Published 2024
    “…Hidden within the enchanted forests of Gemerlapan, a Reflection inside the Mirror of 1990s Alor Setar, the enemy is quick to claim the throne like moths to a flame. Amalia Maganti can communicate with ghosts ever since the mysterious death of her father six years ago. …”
    text
  12. 3512

    User Profiling Based on Nonlinguistic Audio Data by Shen, Jiaxing, Cao, Jiannong, Lederman, Oren, Tang, Shaojie, Pentland, Alex

    Published 2021
    “…User profiling refers to inferring people’s attributes of interest (AoIs) like gender and occupation, which enables various applications ranging from personalized services to collective analyses. …”
    Get full text
    Article
  13. 3513

    Empowering Community-Driven Determination of Values for Language Models by Raman, Deepika

    Published 2024
    “…Emerging technologies like Artificial Intelligence and Large Language Models are often developed in Western contexts and carry implicit values, from developer choices or underlying training data, which are not adequately representative of the diverse contexts in which they are deployed. …”
    Get full text
    Thesis
  14. 3514

    “Clicking” compliant mechanism for flapping-wing micro aerial vehicle by Chin, Yao-Wei, Lau, Gih Keong

    Published 2013
    “…The clicking mechanism is integrated in a thorax-like compliant mechanism, which buckles and consequently produces a large wing stroke when driven by an electric motor. …”
    Get full text
    Get full text
    Conference Paper
  15. 3515

    Self-assembly for supply chains by Yee, Gabriel Qi Ming

    Published 2020
    “…In a similar fashion, the real-world processes of specifying objectives, tasks, and principles are like the specifying of environmental condi-tions when designing self-assembly systems. …”
    Get full text
    Thesis-Master by Research
  16. 3516

    Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm by Tan, Vincent Soon Heng.

    Published 2009
    “…This is especially true and useful for applications like mobile devices which are typically limited in terms of their CPU processing speed, power and network connectivity. …”
    Get full text
    Final Year Project (FYP)
  17. 3517

    High speed AES encryption IC design by Dong, Haokun

    Published 2024
    “…Threshold implementation could enhance the performance by dividing sensitive information, like the secret key and intermediate values, into multiple shares. …”
    Get full text
    Thesis-Master by Coursework
  18. 3518

    2D/3D staircase detection and localization by Wang, Sisong

    Published 2010
    “…This thesis introduces a novel set of PCA-based Haar-like features which extends the classical Haar-like features from local to global domain and are extremely efficient at rejecting non-object regions at the early stages of the cascade. …”
    Get full text
    Thesis
  19. 3519

    Study of wireless body area network by Xuan, Zhi Yang.

    Published 2010
    “…However, there are some issues related to the energy of this wearable system, like inconvenience of changing battery. Therefore, developing energy efficient WBAN system is also a hot research topic. …”
    Get full text
    Final Year Project (FYP)
  20. 3520

    People tracking in video by Siah, Wee Kiat.

    Published 2012
    “…For example, identify potential terrorist in public places like railway stations or spotting enemies in military context to facilitate the planning of battle order. …”
    Get full text
    Final Year Project (FYP)