-
21
A contract negotiation scheme for safety verification of interconnected systems
Published 2024“…This paper proposes a (control) barrier function synthesis and safety verification scheme for interconnected nonlinear systems based on assume-guarantee contracts (AGC) and sum-of-squares (SOS) techniques. …”
Journal article -
22
Vehicle number plate detection and verification using yolo frameworks.
Published 2023“…The system aims to compare the effectiveness of different frameworks by outlining each one's unique advantages and disadvantages by determining the best performance in terms of confidence level and accuracy. The verification is applied to the Malaysian number plates following the regulation of the Malaysian transportation system. …”
Get full text
Article -
23
UVM-based PCIe interrupt model for verification of networking platform IP
Published 2023“…This means there is currently no appropriate interrupt model for verification of Network system IP at both the IP and SoC levels. …”
Get full text
Thesis-Master by Coursework -
24
Separation microkernel security studies and its formal verification related work
Published 2016“…In order to guarantee that it is free of bugs and is following security policies, completely formal verification on XtratuM is conducted by Securify team. …”
Get full text
Final Year Project (FYP) -
25
kboolnet: a toolkit for the verification, validation, and visualization of reaction-contingency (rxncon) models
Published 2023“…The verification script VerifyModel.R checks for responsiveness to repeated stimulations as well as consistency of steady state behavior. …”
Get full text
Article -
26
Design and verification of carefree maneuvering protection for a high performance fighter aircraft
Published 2024Subjects: Get full text
Journal Article -
27
Platform development for control of induction machine (Part II control algorithm verification)
Published 2015Get full text
Final Year Project (FYP) -
28
-
29
An efficient soft error protection scheme for MPSoC and FPGA-based verification
Published 2013Get full text
Get full text
Journal Article -
30
Towards formal verification of Bayesian inference in probabilistic programming via guaranteed bounds
Published 2024“…Overall, these contributions mark a significant step towards formal verification of Bayesian inference results in probabilistic programming.…”
Thesis -
31
What is formal verification without specifications? A survey on mining LTL specifications
Published 2024“…Virtually all verification techniques using formal methods rely on the availability of a formal specification, which describes the design requirements precisely. …”
Book section -
32
Implementation of industry-standard functional coverage in UVM testbench for SoC level verification
Published 2023“…As ICs(Integrated Circuits)process technologies and SoC (system-on-chip) design techniques continue to advance, IC chip designs continue to grow in size and complexity. Verification IP automates the generation of test stimulus, data comparison and coverage statistics, and its verification components are well integrated and reused in the SoC system-level verification environment. …”
Get full text
Thesis-Master by Coursework -
33
Chebyshev Functional Link Neural Network-based modeling and experimental verification for photovoltaic arrays
Published 2013“…In the experimental section, the operating current predicted by CFLNN is compared with the outputs from other two modeling methods - MLP and the two-diode model. Finally, verification is performed using experimental datasets. …”
Get full text
Get full text
Conference Paper -
34
Dose verification of 3D printed male pelvic phantom for radiotherapy quality assurance
Published 2024“…In addition, dose verification was conducted using the phantom with thermoluminescent dosimeter-100 (TLD-100) and ionisation chamber. …”
Get full text
Monograph -
35
-
36
Verification of social media content for news production: a thematic review of journalistic technique and strategies
Published 2023“…This study will benefit knowledge of journalists' verification social media techniques and strategies and future study of journalists' verification practices.…”
Get full text
Article -
37
-
38
Achieving 500x acceleration for adversarial robustness verification of tree-based smart grid dynamic security assessment
Published 2024“…This letter presents a novel and efficient adversarial robustness verification method for tree-based smart grid dynamic security assessment (DSA). …”
Get full text
Journal Article -
39
-
40
A formal methodology for verifying side-channel vulnerabilities in cache architectures
Published 2023Subjects: Get full text
Conference Paper