Search

Your search keyword '"Andrew Crampton"' showing total 23 results

Search Constraints

Start Over You searched for: Author "Andrew Crampton" Remove constraint Author: "Andrew Crampton" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
23 results on '"Andrew Crampton"'

Search Results

1. Enhanced detection of surface deformations in LPBF using deep convolutional neural networks and transfer learning from a porosity model

2. Keyhole Porosity Identification and Localization via X-Ray Imaging With YOLO

3. An empirical analysis of keystroke dynamics in passwords: A longitudinal study

4. Password policy characteristics and keystroke biometric authentication

6. A Convolutional Neural Network (CNN) classification to identify the presence of pores in powder bed fusion images

7. Password policy characteristics and keystroke biometric authentication

8. Robust data expansion for optimised modelling using adaptive neuro-fuzzy inference systems

9. Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems

10. Classifying Ransomware Using Machine Learning Algorithms

11. Automated Planning for Multi-Objective Machine Tool Calibration: Optimising Makespan and Measurement Uncertainty

12. Identification of irregularities and allocation suggestion of relative file system permissions

13. Automatic planning for machine tool calibration: A case study

14. GraphBAD: A general technique for anomaly detection in security information and event management

15. Approximation of surface texture profiles

16. Underestimation vs Overestimation in SAT-based Planning

17. A Novel Software Tool for Analysing NT® File System Permissions

18. A Monte-Carlo path planner for dynamic and partially observable environments

19. Real-Time Path Planning using a Simulation-Based Markov Decision Process

20. Monte-Carlo Planning for Pathfinding in Real-Time Strategy Games

21. Thermal Brake Judder Investigations Using a High Speed Dynamometer

22. Optimising Measurement Processes Using Automated Planning

23. The use of Cryptographic Principles within Metrology Software

Catalog

Books, media, physical & digital resources