Search alternatives:
pinnau » pinna (Expand Search), pinnae (Expand Search)
fine » find (Expand Search), five (Expand Search)
pina » ping (Expand Search), pin (Expand Search), bina (Expand Search)
spinal » spingl (Expand Search), spinl (Expand Search), sbinal (Expand Search)
peng » eng (Expand Search)
lin » link (Expand Search)
line » linke (Expand Search)
pinnau » pinna (Expand Search), pinnae (Expand Search)
fine » find (Expand Search), five (Expand Search)
pina » ping (Expand Search), pin (Expand Search), bina (Expand Search)
spinal » spingl (Expand Search), spinl (Expand Search), sbinal (Expand Search)
peng » eng (Expand Search)
lin » link (Expand Search)
line » linke (Expand Search)
-
3501
A supervised two-channel learning method for hidden Markov model and application on lip reading
Published 2009“…This method is specially designed to train HMMs for fine recognition from similar observations. The prominent features of this method are 1.) the criterion function is based on the difference between training sequences, and 2.) a twochannel structure is adopted to maintain the validity of the HMM. …”
Get full text
Get full text
Conference Paper -
3502
Elastic modulus, hardness and creep performance of SnBi alloys using nanoindentation
Published 2013“…At the intermediate stress region (200–370 MPa), dislocation climb is the dominant creep mechanism with stress exponents around 5–8. When fine lamellar structure is the dominant constituent of the microstructure, phase boundary sliding is identified as the rate-controlling mechanism in the low stress region (<200 MPa).…”
Get full text
Get full text
Journal Article -
3503
Knowledge-based reactive planning and re-planning – a case-study approach
Published 2024“…Planning for uncertainties arising from indoor evacuations can be complex as there’s a fine balance to strike between a too-detailed plan and one that’s too vague. …”
Get full text
Conference or Workshop Item -
3504
Vision-language modelling for radiological imaging and reports in the low data regime
Published 2024“…Combined, they significantly improve retrieval compared to fine-tuning CLIP, roughly equivalent to training with 10x the data. …”
Conference item -
3505
A comparative analysis of missing data imputation techniques on sedimentation data
Published 2024“…A comparative analysis on the missing fine sediment data imputation performance was made based on four different techniques, namely the k-Nearest Neighbourhood (k-NN), Support Vector Regression (SVR), Multiple Regression (MR), and Artificial Neural Network (ANN), under the single imputation (SI) and multiple imputation (MI) regimes. …”
Get full text
Article -
3506
指示代词的翻译——基于三版《爱丽丝漫游奇境记》汉译本的分析 = Demonstratives in translation – analysis based on Alice's Adventures in Wonderland
Published 2024Get full text
Final Year Project (FYP) -
3507
Relationship between synoptic scale meteorology, aircraft parameters, and observable contrails
Published 2024“…Long-lasting or "persistent" contrails are line-shaped clouds that form when airplanes fly through cold and humid parts of the atmosphere that are ice-supersaturated. …”
Get full text
Thesis -
3508
-
3509
Public bus transit service modeling and optimization: from conventional to autonomous vehicles
Published 2022“…In the first part, this thesis proposes a novel tri-level model for a transit service operation design problem that primarily determines the optimal bus line frequency setting. Unlike the existing studies, the strategy choices of passengers in presence of congested common lines are explicitly considered. …”
Get full text
Thesis-Doctor of Philosophy -
3510
Anti-leukaemic and chemotherapy supportive effects of berberis vulgaris l. Fruit crude extract on in vitro and in vivo models
Published 2015“…For the in vitro method, cytotoxic effects of BVFCE were evaluated using MTT assay to determine the IC50 values and compare with non-leukaemic cell line (The 3T3 cell). Observation of the morphological changes in the treated leukaemic cell lines with BVFCE and Doxorubicin (Doxo) was examined using inverted microscope. …”
Get full text
Thesis -
3511
REVENGE IN VIOLENT HUES /
Published 2024“…Hidden within the enchanted forests of Gemerlapan, a Reflection inside the Mirror of 1990s Alor Setar, the enemy is quick to claim the throne like moths to a flame. Amalia Maganti can communicate with ghosts ever since the mysterious death of her father six years ago. …”
text -
3512
User Profiling Based on Nonlinguistic Audio Data
Published 2021“…User profiling refers to inferring people’s attributes of interest (AoIs) like gender and occupation, which enables various applications ranging from personalized services to collective analyses. …”
Get full text
Article -
3513
Empowering Community-Driven Determination of Values for Language Models
Published 2024“…Emerging technologies like Artificial Intelligence and Large Language Models are often developed in Western contexts and carry implicit values, from developer choices or underlying training data, which are not adequately representative of the diverse contexts in which they are deployed. …”
Get full text
Thesis -
3514
“Clicking” compliant mechanism for flapping-wing micro aerial vehicle
Published 2013“…The clicking mechanism is integrated in a thorax-like compliant mechanism, which buckles and consequently produces a large wing stroke when driven by an electric motor. …”
Get full text
Get full text
Conference Paper -
3515
Self-assembly for supply chains
Published 2020“…In a similar fashion, the real-world processes of specifying objectives, tasks, and principles are like the specifying of environmental condi-tions when designing self-assembly systems. …”
Get full text
Thesis-Master by Research -
3516
Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
Published 2009“…This is especially true and useful for applications like mobile devices which are typically limited in terms of their CPU processing speed, power and network connectivity. …”
Get full text
Final Year Project (FYP) -
3517
High speed AES encryption IC design
Published 2024“…Threshold implementation could enhance the performance by dividing sensitive information, like the secret key and intermediate values, into multiple shares. …”
Get full text
Thesis-Master by Coursework -
3518
2D/3D staircase detection and localization
Published 2010“…This thesis introduces a novel set of PCA-based Haar-like features which extends the classical Haar-like features from local to global domain and are extremely efficient at rejecting non-object regions at the early stages of the cascade. …”
Get full text
Thesis -
3519
Study of wireless body area network
Published 2010“…However, there are some issues related to the energy of this wearable system, like inconvenience of changing battery. Therefore, developing energy efficient WBAN system is also a hot research topic. …”
Get full text
Final Year Project (FYP) -
3520
People tracking in video
Published 2012“…For example, identify potential terrorist in public places like railway stations or spotting enemies in military context to facilitate the planning of battle order. …”
Get full text
Final Year Project (FYP)