-
1881
Segmentation of magnetic resonance images for assessing neonatal brain maturation
Published 2016“…This thesis thus focuses on structural segmentation and spatio-temporal modelling of the so-called myelin-like signals on T2-weighted scans for early prognostic evaluation of the preterm brain.…”
Thesis -
1882
A comparison of lesion mapping analyses based on CT versus MR imaging in stroke
Published 2023“…This finding is critically important as it suggests that future studies can employ CT-derived lesion masks if these scans are available within the appropriate time-window.…”
Journal article -
1883
Quantifying canine tissue stiffness change patterns using shear-wave elastography: implications for time of death estimation
Published 2024“…The Mann-Whitney U-test and Spearman correlation coefficient showed insignificant correlation between gender and weight with shear-wave velocity (SWV) in ante-mortem scans. The Kruskal-Wallis H-test showed significant differences in SWV for all organs. …”
Article -
1884
Taxonomic composition and seasonal dynamics of the air microbiome in West Siberia
Published 2021Get full text
Journal Article -
1885
The inference-boundary model reinterpreting theme and rheme
Published 2013“…The Hallidayan notions of theme and rheme pose an interesting challenge to linguists in their attempts to pin them down more specifically. This paper argues that since the thematic structure of the clause organises it as a message, a useful starting point in theme–rheme research is an understanding of how clausal messages are typically processed by language users. …”
Get full text
Get full text
Journal Article -
1886
The effects of processing conditions on the morphology of single conjugated polymers.
Published 2010“…Drop-cast single chains were proposed to either retain its extended conformation in CHCl3 solution, or adopt an ordered structure with hair-pin loops, giving rise to two corresponding distinct types of intensity traces. …”
Get full text
Final Year Project (FYP) -
1887
Experimental and numerical study of self-locking adaptable inter connection for modular steel structures
Published 2023“…The findings indicated that the gap produced between connection and column under higher displacement was sensitive to the outer bolt and spring pin. This gap could be further reduced by increasing the number of outer bolts and by reducing tolerance between adapter and column walls.…”
Article -
1888
Smart home control system design using internet of things based energy harvesting technology
Published 2024“…The objective of this research is to provide security for homeowners by facilitating fingerprints and PIN (Personal Identification Numbers) in entering the house, then in the event of a power outage, it activates the function of energy harvesting technology. …”
Get full text
Conference or Workshop Item -
1889
Automatic vanishing points detection for single view reconstruction
Published 2018“…The algorithm is found to be fast and effective for an image with clear feature lines but struggles with an image with few feature lines. …”
Get full text
Final Year Project (FYP) -
1890
Determinants of foreign direct investment in Singapore.
Published 2008Get full text
Final Year Project (FYP) -
1891
Train following model for urban rail transit performance analysis
Published 2024“…Based on the model developed, the impacts of factors such as service frequency, headway variations, passenger demand, and initial train delays on line performance (i.e. line throughput and train knock-on delays) are explored. …”
Get full text
Article -
1892
Ultra wideBand indoor position localizaiton
Published 2014“…It is specifically the case when line-of-sight (LOS) is absent due to severe blockage. …”
Get full text
Thesis -
1893
Executive's Cybersecurity Program Handbook : A comprehensive guide to building and operationalizing a complete cybersecurity program /
Published 2023“…What you will learn Explore various cybersecurity frameworks such as NIST and ISO Implement industry-standard cybersecurity policies and procedures effectively to minimize the risk of cyberattacks Find out how to hire the right talent for building a sound cybersecurity team structure Understand the difference between security awareness and training Explore the zero-trust concept and various firewalls to secure your environment Harden your operating system and server to enhance the security Perform scans to detect vulnerabilities in software Who this book is for This book is for you if you are a newly appointed security team manager, director, or C-suite executive who is in the transition stage or new to the information security field and willing to empower yourself with the required knowledge. …”
Get full text
Get full text
software, multimedia -
1894
Towards haptic intelligence in robots by learning from demonstration
Published 2022“…Specifically, the contribution here is the viewing of triangular meshes of objects, i.e., the internal model extracted from their 3D scans, not only as a source of geometric information, but also of haptic feedback. …”
Get full text
Thesis-Doctor of Philosophy -
1895
-
1896
-
1897
《史记·滑稽列传》四题 = Four topics on memoir of Guji in Shiji
Published 2017Get full text
Get full text
Book -
1898
Rapid and Scalable Production of Functional SARS-CoV-2 Virus-like Particles (VLPs) by a Stable HEK293 Cell Pool
Published 2024“…We employed the membrane, envelope, and highly immunogenic spike proteins of SARS-CoV-2 to produce virus-like particles (VLPs) using the HEK293-F cell line as a host system with an economical transfection reagent. …”
Get full text
Article -
1899
-
1900
Stress-inducible-stem cells : a new view on endocrine, metabolic and mental disease?
Published 2020“…In general terms we all use the word“stress”to describe ourdiscomfort in coping with challenges of daily life. This ismostly related to our subjective perceptions of workloadand/or other unexpected physical or mental efforts we areexposed to. …”
Get full text
Journal Article