-
281
Online deep transfer learning applied to building quality assessment robots
Published 2019“…Various learning algorithms have been developed to illustrate the power of the proposed framework. …”
Get full text
Get full text
Thesis -
282
Search disambiguation techniques in multimedia collections
Published 2012“…We base our faceted retrieval framework on probabilistic topic models, a class of algorithms designed to discover the latent thematic structures in a document collection. …”
Get full text
Thesis -
283
Harnessing online social media to deal with information overload.
Published 2013“…We propose an unsupervised approach for named entity recognition in targeted Twitter stream. Within this work, we develop an algorithm of tweet segmentation which splits each tweet into non-overlapping phrases, called tweet segments. …”
Get full text
Thesis -
284
Multi-modal memetic framework for locating saddle points, with application to biomolecular systems : water clusters and ring-deficient covalently-bonded small molecules
Published 2013“…From synthetic benchmark problems to real-world problems, the multi-modal memetic framework is applied to systems representing the two main streams of the molecular systems, namely, water clusters and small ring-deficient molecules. …”
Get full text
Thesis -
285
Prediction of learning outcomes via clickstream data using machine learning
Published 2021“…The focus is then shifted to the identification of click-stream problem solving approaches. A sequential clustering framework that employs string metrics to differentiate pairs of sequences and a sequential pattern mining algorithm to summarize cluster members is proposed. …”
Get full text
Thesis-Doctor of Philosophy -
286
Micro electro mechanical systems (MEMS) enabled digital pen
Published 2015“…Lastly, navigation algorithms were looked into to determine the best algorithm for use with the digital pen. …”
Get full text
Final Year Project (FYP) -
287
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…Addressing these challenges entails an efficient and robust object detection and recognition algorithm. This algorithm can deal with a crowd of multiple faces via a mobile camera carried by a mini drone, and performs realtime video processing. …”
Get full text
Article -
288
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…The MIKE11 model was developed based on surveyed, stream cross-section data to perform hydrodynamic simulation of the flooding process. …”
Get full text
Thesis -
289
Efficient interactive multi-resolution rendering for translucent materials under area lights
Published 2017“…As the LPV is not a physically accurate algorithm, flux can be lost unnecessarily for each simulation step. …”
Get full text
Thesis -
290
Accident risk assessment and prediction using surrogate indicators and machine learning
Published 2019“…From another perspective, indicator-based risk assessment is extended to general traffic streams. The unsupervised vehicle-level risk rating is achieved by clustering and the extraction of risk indicator features. …”
Get full text
Thesis-Doctor of Philosophy -
291
Robust and efficient deep learning methods for vision-based action recognition
Published 2021“…By excluding optical flow estimation or calculation, ACTF can be combined with any spatial feature extraction network under the two-stream structure for end-to-end training. Meanwhile, capturing long-range spatiotemporal dependencies is an effective strategy for extracting spatiotemporal correlation features. …”
Get full text
Thesis-Doctor of Philosophy -
292
A machine-learned approach for reducing airborne delays and environmental impact in terminal manoeuvring area using extended arrival management
Published 2024“…The agents are trained over 1 million steps using the Proximal Policy Optimization (PPO) algorithm and evaluated through 100 simulations against two baseline scenarios: no action and random action. …”
Get full text
Thesis-Doctor of Philosophy -
293
Robust watermarking of compressed and encrypted JPEG2000 images
Published 2013“…The encryption algorithm we propose to use is a stream cipher. While the proposed technique embeds watermark in the compressed-encrypted domain, the extraction of watermark can be done in the decrypted domain. …”
Get full text
Get full text
Journal Article -
294
Digital rights management system novel encryption and scrambling technique
Published 2011“…Puzzling encryption is a light weight compression-independent encryption algorithm. As the name sounds, the concept of this algorithm is like a puzzle where video stream will be encrypted in blocks and subsequently shuffled up like a puzzle. …”
Get full text
Final Year Project (FYP) -
295
-
296
RFID data reliability optimiser based on two dimensions bloom filter
Published 2017“…Both types of readings need to be removes to ensure reliability of information produced from the data streams. In this paper, a single approach, which based on Bloom filter was proposed to remove both dirty data from the RFID data streams. …”
Get full text
Article -
297
Microfluidic rheometer based on hydrodynamic focusing
Published 2012“…Fixing the flow rate ratio and using a known Newtonian liquid for the sheath streams, the viscosity and the shear stress of the sample stream can be determined by measuring its width and using a prediction algorithm that uses the known channel geometries, fluid properties, flow rates and the focused width as input parameters. …”
Get full text
Get full text
Journal Article -
298
Network selection and resource allocation for multicast in HetNets
Published 2014“…In a heterogeneous wireless system, the member stations of a multicast stream may be distributed in many networks within the system. …”
Get full text
Get full text
Get full text
Journal Article -
299
Providing dynamic TXOP for QoS support of video transmission in IEEE 802.11e WLANs
Published 2015“…The proposed scheduling algorithm has been evaluated using simulation with different variability level video streams. …”
Get full text
Article -
300
The optimization of stepping stone detection : packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
Get full text
Article