Showing 1,941 - 1,960 results of 4,037 for search '((sspinae OR line) OR (((scans OR (pin OR (ying OR yong))) OR (bina OR linga)) OR ling))', query time: 0.20s Refine Results
  1. 1941

    The inference-boundary model reinterpreting theme and rheme by Leong, Ping Alvin

    Published 2013
    “…The Hallidayan notions of theme and rheme pose an interesting challenge to linguists in their attempts to pin them down more specifically. This paper argues that since the thematic structure of the clause organises it as a message, a useful starting point in theme–rheme research is an understanding of how clausal messages are typically processed by language users. …”
    Get full text
    Get full text
    Journal Article
  2. 1942

    The effects of processing conditions on the morphology of single conjugated polymers. by Yeo, Hui Lin.

    Published 2010
    “…Drop-cast single chains were proposed to either retain its extended conformation in CHCl3 solution, or adopt an ordered structure with hair-pin loops, giving rise to two corresponding distinct types of intensity traces. …”
    Get full text
    Final Year Project (FYP)
  3. 1943

    Experimental and numerical study of self-locking adaptable inter connection for modular steel structures by Nadeem, Gohar, Safiee, Nor Azizi, Bakar, Nabilah Abu, Karim, Izian Abd, Mohd Nasir, Noor Azline

    Published 2023
    “…The findings indicated that the gap produced between connection and column under higher displacement was sensitive to the outer bolt and spring pin. This gap could be further reduced by increasing the number of outer bolts and by reducing tolerance between adapter and column walls.…”
    Article
  4. 1944

    Smart home control system design using internet of things based energy harvesting technology by Silalahi, Lukman Medriavin, Indrawan, Muhammad Rafi, Budiyanto, Setiyo, Hanafi, Dirman, Abdul Hamid, Abdul Hamid, Ronaldo, Davit

    Published 2024
    “…The objective of this research is to provide security for homeowners by facilitating fingerprints and PIN (Personal Identification Numbers) in entering the house, then in the event of a power outage, it activates the function of energy harvesting technology. …”
    Get full text
    Conference or Workshop Item
  5. 1945

    Automatic vanishing points detection for single view reconstruction by Potcharaphol, Chat Anan

    Published 2018
    “…The algorithm is found to be fast and effective for an image with clear feature lines but struggles with an image with few feature lines. …”
    Get full text
    Final Year Project (FYP)
  6. 1946

    Train following model for urban rail transit performance analysis by Saidi, Saeid, Koutsopoulos, Haris N, Wilson, Nigel HM, Zhao, Jinhua

    Published 2024
    “…Based on the model developed, the impacts of factors such as service frequency, headway variations, passenger demand, and initial train delays on line performance (i.e. line throughput and train knock-on delays) are explored. …”
    Get full text
    Article
  7. 1947

    Ultra wideBand indoor position localizaiton by Xu, Jun

    Published 2014
    “…It is specifically the case when line-of-sight (LOS) is absent due to severe blockage. …”
    Get full text
    Thesis
  8. 1948

    Executive's Cybersecurity Program Handbook : A comprehensive guide to building and operationalizing a complete cybersecurity program / by Brown, Jason, author 656359, Packt Publishing (Online service) 656336

    Published 2023
    “…What you will learn Explore various cybersecurity frameworks such as NIST and ISO Implement industry-standard cybersecurity policies and procedures effectively to minimize the risk of cyberattacks Find out how to hire the right talent for building a sound cybersecurity team structure Understand the difference between security awareness and training Explore the zero-trust concept and various firewalls to secure your environment Harden your operating system and server to enhance the security Perform scans to detect vulnerabilities in software Who this book is for This book is for you if you are a newly appointed security team manager, director, or C-suite executive who is in the transition stage or new to the information security field and willing to empower yourself with the required knowledge. …”
    Get full text
    Get full text
    software, multimedia
  9. 1949

    Towards haptic intelligence in robots by learning from demonstration by Turlapati Sri Harsha

    Published 2022
    “…Specifically, the contribution here is the viewing of triangular meshes of objects, i.e., the internal model extracted from their 3D scans, not only as a source of geometric information, but also of haptic feedback. …”
    Get full text
    Thesis-Doctor of Philosophy
  10. 1950
  11. 1951
  12. 1952
  13. 1953
  14. 1954

    CLT for linear spectral statistics of normalized sample covariance matrices with the dimension much larger than the sample size by Chen, Binbin, Pan, Guangming

    Published 2015
    “…Let A = 1/√np(XT X−pIn) where X is a p×n matrix, consisting of independent and identically distributed (i.i.d.) real random variables Xij with mean zero and variance one. …”
    Get full text
    Get full text
    Journal Article
  15. 1955

    Flexural buckling behaviour and residual strengths of S700 high strength steel circular hollow section columns after exposure to fire by Koh, Alicia

    Published 2021
    “…The experimental study which includes the furnace tests, material tests, initial global imperfection measurements, and pin-ended column tests was conducted and reported. …”
    Get full text
    Final Year Project (FYP)
  16. 1956

    3D modelling using digital camera by Chong, Yeow Koon.

    Published 2010
    “…Some other trial targets that we have done includes fire station, NTU N2 building and a three pin plug. More details will be covered in chapter 2 of this report.…”
    Get full text
    Final Year Project (FYP)
  17. 1957

    NTU e-bike by Zeng, Wei

    Published 2011
    “…To support the touchscreen, the expansion board pin configurations are modified according to the schematic connections, also the kernel changed to detect the GPS device, the Éclair system can‟t get GPS information directly since a hardware abstraction layer (HAL) is needed for interacting between the Android framework and the kernel. …”
    Get full text
    Final Year Project (FYP)
  18. 1958
  19. 1959
  20. 1960

    Invisible love. by Woon, Joanna.

    Published 2012
    Get full text
    Final Year Project (FYP)