Search alternatives:
modelling insight » modeling insights (Expand Search), revealing insight (Expand Search)
modelling design » modelling device (Expand Search), modelling testing (Expand Search), modelling using (Expand Search)
collins design » column design (Expand Search), coding design (Expand Search)
new words » new world (Expand Search)
modelling insight » modeling insights (Expand Search), revealing insight (Expand Search)
modelling design » modelling device (Expand Search), modelling testing (Expand Search), modelling using (Expand Search)
collins design » column design (Expand Search), coding design (Expand Search)
new words » new world (Expand Search)
-
1
Kansei evaluation and clustering in emotional design
Published 2011“…A case study was done to validate the proposed methodology and a fair comparison of the results with an existing method was made to evaluate the robustness of the proposed methodology. 10 Kansei tags were produced for 32 Kansei words as opposed to only 8 Kansei tags using the existing method. …”
Get full text
Final Year Project (FYP) -
2
System-level design of low-carbon structures
Published 2024“…While the design space of wild data includes a diverse variety of projects, leveraging a synthetic dataset computed from a bottom-up parametric model helps produce insights specific to the design problem at hand. …”
Get full text
Get full text
Thesis -
3
The triple, quadruple, and quintuple helix models: A bibliometric analysis and research agenda
Published 2024“…The helix model (triple, quadruple, and quintuple) research has grown drastically in the past decade as a practical approach for establishing new theories and spreading knowledge. …”
Get full text
Article -
4
-
5
Using Principles from Cognitive Science to Analyze and Guide Language-Related Neural Networks
Published 2024“…First, human naming systems (e.g., a language’s words for colors such as “red” or “blue”) appear near-optimal in an informationtheoretic sense of compressing meaning into a small number of words; I ask how one might train AI systems that behave similarly. …”
Get full text
Thesis -
6
Human activity recognition and analysis based on FPGA microboard three-axis accelerometer
Published 2018“…Analysis showed that the proposed extraction method can achieve an average recognition rate of 100%, which truly validate the proposed feature extraction method. A recognition algorithm based on standard deviation, skewness, kurtosis and correlation coefficients is also proposed to identity 5 walk pattems, i.e., standing, walking, running, going upstairs and going downstairs. …”
Get full text
Thesis -
7
Extracting time expressions and named entities with constituent-based tagging schemes
Published 2022“…To model named entities, we defined a constituent-based tagging scheme termed UGTO scheme with four tags, namely U, G, T, and O, indicating the defined constituents of named entities, namely uncommon word, general modifier, trigger word, and the words outside named entities. …”
Get full text
Journal Article -
8
Domain-agnostic document and question classification using natural language processing techniques
Published 2022“…Since domain-agnostic classification takes the implicit substance of a text into account (e.g., learning outcome of the same DSP question irrespective of the content), it relies on a suitable feature extraction process. …”
Get full text
Thesis-Doctor of Philosophy -
9
-
10
Fault-injection based attacks and countermeasure on deep neural network accelerators
Published 2021Get full text
Thesis-Doctor of Philosophy -
11
Semantic-based vulnerability analysis of software
Published 2020“…By discussing the design of FOT, we can establish a better understanding about greybox fuzzing as a basis for comprehending the next works in this thesis.Second, we study an approach to improve the effectiveness of greybox fuzzing by allowing it to penetrate through magic word comparisons in the target program. …”
Get full text
Thesis-Doctor of Philosophy -
12
Adaptive resource optimization of three-tier web applications running on the cloud
Published 2018“…It employs the Virtual Machine (VM) technology to provide on-demand provisioning of resources on a pay-as-you-go base. …”
Get full text
Get full text
Thesis