Showing 1 - 9 results of 9 for search 'new words : ((collins design) OR (modelling design)),~', query time: 0.22s Refine Results
  1. 1

    Kansei evaluation and clustering in emotional design by Ng, Kassyn.

    Published 2011
    “…A case study was done to validate the proposed methodology and a fair comparison of the results with an existing method was made to evaluate the robustness of the proposed methodology. 10 Kansei tags were produced for 32 Kansei words as opposed to only 8 Kansei tags using the existing method. …”
    Get full text
    Final Year Project (FYP)
  2. 2

    System-level design of low-carbon structures by Fang, Demi L.

    Published 2024
    “…Holistic design strategies can help achieve this, but these current paradigms of performance-driven design (e.g. deploying rules of thumb, comparing a few design options, and optimization) are limited in their capacity to inform decision-making towards higher performing designs. …”
    Get full text
    Get full text
    Thesis
  3. 3

    The triple, quadruple, and quintuple helix models: A bibliometric analysis and research agenda by Haziman, Zakaria, Muhammad Ashraf, Fauzi, Diyana, Kamarudin, Norazah, Mohd Suki, Mohd Ariff, Kasim

    Published 2024
    “…The helix model (triple, quadruple, and quintuple) research has grown drastically in the past decade as a practical approach for establishing new theories and spreading knowledge. …”
    Get full text
    Article
  4. 4

    Human activity recognition and analysis based on FPGA microboard three-axis accelerometer by Han, Yating

    Published 2018
    “…Analysis showed that the proposed extraction method can achieve an average recognition rate of 100%, which truly validate the proposed feature extraction method. A recognition algorithm based on standard deviation, skewness, kurtosis and correlation coefficients is also proposed to identity 5 walk pattems, i.e., standing, walking, running, going upstairs and going downstairs. …”
    Get full text
    Thesis
  5. 5

    Extracting time expressions and named entities with constituent-based tagging schemes by Zhong, Xiaoshi, Cambria, Erik, Hussain Amir

    Published 2022
    “…To model named entities, we defined a constituent-based tagging scheme termed UGTO scheme with four tags, namely U, G, T, and O, indicating the defined constituents of named entities, namely uncommon word, general modifier, trigger word, and the words outside named entities. …”
    Get full text
    Journal Article
  6. 6
  7. 7
  8. 8

    Semantic-based vulnerability analysis of software by Li, Yuekang

    Published 2020
    “…By discussing the design of FOT, we can establish a better understanding about greybox fuzzing as a basis for comprehending the next works in this thesis.Second, we study an approach to improve the effectiveness of greybox fuzzing by allowing it to penetrate through magic word comparisons in the target program. …”
    Get full text
    Thesis-Doctor of Philosophy
  9. 9

    Adaptive resource optimization of three-tier web applications running on the cloud by Borhani, Amir Hossein

    Published 2018
    “…It employs the Virtual Machine (VM) technology to provide on-demand provisioning of resources on a pay-as-you-go base. …”
    Get full text
    Get full text
    Thesis