Search alternatives:
modelling design » modelling device (Expand Search), modelling insight (Expand Search), modelling testing (Expand Search)
collins design » column design (Expand Search), coding design (Expand Search)
new words » new world (Expand Search)
modelling design » modelling device (Expand Search), modelling insight (Expand Search), modelling testing (Expand Search)
collins design » column design (Expand Search), coding design (Expand Search)
new words » new world (Expand Search)
-
1
Kansei evaluation and clustering in emotional design
Published 2011“…A case study was done to validate the proposed methodology and a fair comparison of the results with an existing method was made to evaluate the robustness of the proposed methodology. 10 Kansei tags were produced for 32 Kansei words as opposed to only 8 Kansei tags using the existing method. …”
Get full text
Final Year Project (FYP) -
2
System-level design of low-carbon structures
Published 2024“…Holistic design strategies can help achieve this, but these current paradigms of performance-driven design (e.g. deploying rules of thumb, comparing a few design options, and optimization) are limited in their capacity to inform decision-making towards higher performing designs. …”
Get full text
Get full text
Thesis -
3
The triple, quadruple, and quintuple helix models: A bibliometric analysis and research agenda
Published 2024“…The helix model (triple, quadruple, and quintuple) research has grown drastically in the past decade as a practical approach for establishing new theories and spreading knowledge. …”
Get full text
Article -
4
Human activity recognition and analysis based on FPGA microboard three-axis accelerometer
Published 2018“…Analysis showed that the proposed extraction method can achieve an average recognition rate of 100%, which truly validate the proposed feature extraction method. A recognition algorithm based on standard deviation, skewness, kurtosis and correlation coefficients is also proposed to identity 5 walk pattems, i.e., standing, walking, running, going upstairs and going downstairs. …”
Get full text
Thesis -
5
Extracting time expressions and named entities with constituent-based tagging schemes
Published 2022“…To model named entities, we defined a constituent-based tagging scheme termed UGTO scheme with four tags, namely U, G, T, and O, indicating the defined constituents of named entities, namely uncommon word, general modifier, trigger word, and the words outside named entities. …”
Get full text
Journal Article -
6
-
7
Fault-injection based attacks and countermeasure on deep neural network accelerators
Published 2021Get full text
Thesis-Doctor of Philosophy -
8
Semantic-based vulnerability analysis of software
Published 2020“…By discussing the design of FOT, we can establish a better understanding about greybox fuzzing as a basis for comprehending the next works in this thesis.Second, we study an approach to improve the effectiveness of greybox fuzzing by allowing it to penetrate through magic word comparisons in the target program. …”
Get full text
Thesis-Doctor of Philosophy -
9
Adaptive resource optimization of three-tier web applications running on the cloud
Published 2018“…It employs the Virtual Machine (VM) technology to provide on-demand provisioning of resources on a pay-as-you-go base. …”
Get full text
Get full text
Thesis