Showing 1 - 20 results of 12,023 for search '(melba OR ((meta OR wild) OR ((((della OR delta) OR dell) OR (full OR all)) OR (well OR plan))))', query time: 0.28s Refine Results
  1. 1

    High-efficiency all-inorganic full-colour quantum dot light-emitting diodes by Yang, Xuyong, Zhang, Zi-Hui, Ding, Tao, Wang, Ning, Chen, Guo, Dang, Cuong, Demir, Hilmi Volkan, Sun, Xiao Wei

    Published 2020
    “…However, the performance for the present all-inorganic QLEDs is far inferior to that of the well-developed QLEDs with organic charge transport layers. …”
    Get full text
    Journal Article
  2. 2
  3. 3
  4. 4

    The Deutsche Welle radio training (RTC)

    Published 2008
    Subjects: “…DRNTU::Social sciences::Mass media::Media planning…”
    Get full text
    Get full text
    Conference Paper
  5. 5

    The wet, the wild and the wondrous by Kuek, Sophia Ying Ting, Lim, Christel Wenfang, Josh, Raeburn Brandon, Toh, Yi Shien

    Published 2022
    “…What makes seemingly mundane grocery shopping venues and experiences so important to Singapore's social space? The Wet, the Wild and the Wondrous takes a granular look at the aspects of wet markets – architectural, sociological, economic – that make up its unique character. …”
    Get full text
    Final Year Project (FYP)
  6. 6

    Fisher vector faces in the wild by Simonyan, K, Parkhi, O, Vedaldi, A, Zisserman, A

    Published 2013
    “…This compact descriptor has a better recognition accuracy and is very well suited to large scale identification tasks.…”
    Conference item
  7. 7

    Association between self-reported napping and risk of cardiovascular disease and all-cause mortality: a meta-analysis of cohort studies by Wang, Meng, Xiang, Xin, Zhao, Zhengyan, Liu, Yu, Cao, Yang, Guo, Weiwei, Hou, Linlin, Jiang, Qiuhuan

    Published 2024
    “…Objectives This meta-analysis aims to assess the association between adult nap duration and risk of all-cause mortality and cardiovascular diseases (CVD). …”
    Get full text
    Article
  8. 8

    Hamilton's principle and delta neutral portfolio by Taufan Rusli.

    Published 2009
    “…In its derivation, Black and Scholes came up with a model based on setting up a delta neutral portfolio. Applying no arbitrage principle on the delta neutral portfolio, the Black Scholes partial differential equation is obtained. …”
    Get full text
    Final Year Project (FYP)
  9. 9

    The intelligence of artifice: Oscar Wilde and AI by Tyson, C, Mendelssohn, M

    Published 2025
    “…Yet for all that has been said about Wilde and artifice, the task of connecting English literature’s silver-tongued champion of artificiality to emerging debates about how artificial intelligence might reshape art and culture has not yet been undertaken. …”
    Journal article
  10. 10
  11. 11
  12. 12

    (Re)wilding London: fabric, politics, and aesthetics by Turnbull, J, Fry, T, Lorimer, J

    Published 2025
    “…There is a growing body of science, ambitious landscape-scale plans, and increasing political will. But until recently, cities and the urban were neglected; the idea of urban rewilding seen as oxymoronic. …”
    Journal article
  13. 13

    Towards robust monocular depth estimation in the wild by Zheng, Zhenkai

    Published 2022
    “…This research project aims to create a robust monocular depth estimation model that is capable of predicting accurate relative depth maps in the wild. The project will highlight the significance of the training dataset used during supervised model training by comparing models trained with our new mixed dataset in the wild with a common open-source dataset such as NYU. …”
    Get full text
    Final Year Project (FYP)
  14. 14

    It's not that dark, after all by Chia, Glenda

    Published 2023
    “…"It's not that dark, after all." is a graphic novel based on different individuals' versions of their own experiences with the fear of the dark. …”
    Get full text
    Final Year Project (FYP)
  15. 15

    All about VLAD by Arandjelović, R, Zisserman, A

    Published 2013
    “…These two methods set a new state-of-the-art over all benchmarks investigated here for both mid-dimensional (20k-D to 30k-D) and small (128-D) descriptors. …”
    Conference item
  16. 16

    UMPSA explores aviation with Delta Aerospace Sdn. Bhd. by Naqiah, Puaad

    Published 2024
    “…SUBANG, 13 September 2024 – Universiti Malaysia Pahang Al-Sultan Abdullah (UMPSA) is expanding its cooperation in the field of aviation with industry partners through the signing of a Memorandum of Understanding (MoU) with Delta Aerospace Sdn. Bhd. recently.…”
    Get full text
    Newspaper
  17. 17

    Comparison of different demodulator fliters for sigma-delta modulator by Xue, Yao.

    Published 2008
    “…Sigma-Delta modulators have been widely used in the implementation of high quality A/D and D/A converters. …”
    Get full text
    Thesis
  18. 18
  19. 19

    Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries by Blessing, Jenny, Specter, Michael A., Weitzner, Daniel J.

    Published 2024
    “…Cryptographic design and implementation issues make up 27.5% of vulnerabilities across all libraries, with side-channel attacks providing a further 19.4%. …”
    Get full text
    Article
  20. 20

    Discriminative deep metric learning for face verification in the wild by Hu, Junlin, Lu, Jiwen, Tan, Yap Peng

    Published 2015
    “…This paper presents a new discriminative deep metric learning (DDML) method for face verification in the wild. Different from existing metric learning-based face verification methods which aim to learn a Mahalanobis distance metric to maximize the inter-class variations and minimize the intra-class variations, simultaneously, the proposed DDML trains a deep neural network which learns a set of hierarchical nonlinear transformations to project face pairs into the same feature subspace, under which the distance of each positive face pair is less than a smaller threshold and that of each negative pair is higher than a larger threshold, respectively, so that discriminative information can be exploited in the deep network. …”
    Get full text
    Get full text
    Conference Paper