-
81
Component-based security under partial compromise
Published 2018“…During design and implementation, the foremost of these is formal verification. Large, real-world systems and protocols made up of multiple computers or components are rarely designed with verification or analysis in mind. …”
Thesis -
82
Research and comparison of deepfake audio detection algorithms
Published 2022“…Similar to other biometric systems, speaker verification systems are easy to be affected by various spoofing attacks. …”
Get full text
Thesis-Master by Coursework -
83
Control strategy for islanded DC microgrids
Published 2025“…The designed experiments verify the feasibility of the proposed method from the perspectives of validity verification, load switching and voltage variation.…”
Get full text
Thesis-Master by Coursework -
84
Finite element analysis on post-buckling of thin-walled structures using ANSYS
Published 2015“…During the course of verification for lipped column of previous study, it was discovered that there was an error in location of the neutral axis which would affect the loading location and revisions were done to ensure accurate and complete coverage of the current and previous specimens. …”
Get full text
Final Year Project (FYP) -
85
Security enhancement of the communication-efficient AUTHMAC_DH protocols
Published 2013“…Security analysis and formal verification by using AVISPA toolkit show that the proposed protocol can keep all the previous properties and is secure against the off-line guessing attack.…”
Get full text
Get full text
Journal Article -
86
Identifying individuals in video by combining 'generative' and discriminative head models
Published 2005“…Images rendered using the head model are used to train a discriminative tree-structured classifier giving efficient detection and pose estimates over a very wide pose range with three degrees of freedom. Subsequent verification of the identity is obtained using the head model in a 'generative' framework. …”
Conference item -
87
Parallel and distributed algorithms for computational fluid flow simulations
Published 2018“…In this thesis, after describing the mathematical formulation of an incompressible Newtonian fluid flow based on the Navier- Stokes equations, the standard numerical methods as well as alternative Lattice Boltzmann approaches are discussed. The verification for the models' accuracy verification is then presented, which show the excellent agreement of the simulation results and reference values for the simulation cases. …”
Get full text
Thesis -
88
Performance-based blast resistant design of reinforced concrete frame structures under distant explosions
Published 2008“…The implementation of the design method is demonstrated from practical design examples and followed by the numerical verification study…”
Get full text
Thesis -
89
Singlet fission materials for improved solar cells
Published 2021“…From the H-NMR spectroscopy, it can be observed that compound 5 has been obtained through the Suzuki coupling. However, further verification is needed through other characterization methods, such as UV-Vis and Fluorescence spectroscopy, and Mass spectroscopy, as C-13 NMR result was unable to be obtained due to the low solubility of compound 5.…”
Get full text
Final Year Project (FYP) -
90
Develop of wideband acoustic sensor
Published 2022“…After the circuit verification and simulation, the performance of the circuit meets the design requirements.…”
Get full text
Thesis-Master by Coursework -
91
Integrated 3D inductors
Published 2024“…This Final Year Project pertains to the design and verification of integrated 3D inductors for high-frequency applications, such as integrated power management systems and wireless communications. …”
Get full text
Final Year Project (FYP) -
92
-
93
General synthesis method for symmetrical even-order Chebyshev bandpass filter
Published 2013“…Subsequently, a 4th-order Chebyshev bandpass filter based on λ/2 microstrip-line resonators centering at 2.4 GHz with a fractional bandwidth of 10.0% are synthesized and fabricated, the measured results provide strong verification for the proposed synthesis method.…”
Get full text
Get full text
Conference Paper -
94
Lost in quantization: improving particular object retrieval in large scale image databases
Published 2008“…We describe how this representation may be incorporated into a standard tf-idf architecture, and how spatial verification is modified in the case of this soft-assignment. …”
Conference item -
95
Handbook Of Marine Craft Hydrodynamics And Motion Control /
Published 2021“…The text establishes how the implementation of mathematical models and modern control theory can be used for simulation and verification of control systems, decision-support systems, and situational awareness systems. …”
Get full text
software, multimedia -
96
Realising the non-Hermitian skin effect with a nonlinear circuit
Published 2024“…The study also proposes a comprehensive experimental verification setup, which includes a printed circuit board designed specifically for observing NHSE in nonlinear circuits.…”
Get full text
Final Year Project (FYP) -
97
Development of runoff simulation model using excel
Published 2010“…In addition to that, a reservoir routing model has also been developed. For verification, the runoff simulation model has been applied to two artificial and one natural catchment. …”
Get full text
Final Year Project (FYP) -
98
Development of an intelligent solar energy system for off-grid application
Published 2010“…Simulations were carried out using PSIM software for verification before hardware circuits were developed for actual implementation.…”
Get full text
Final Year Project (FYP) -
99
Face recognition in unconstrained images and videos
Published 2014“…Motivated from the results on image datasets, a novel framework is proposed for face verification in unconstrained videos. By leveraging the pose angle information, we employ a divide and conquer approach through the following steps (a) divide the keyframes of the original video into several pose categories from extreme left to right profile face and synthesize the appearance at all missing poses (b) propose the ensemble cross-pose classifiers to recognize human faces despite pose differences by cross reference the subset of the original training data with the same pose categories. …”
Get full text
Thesis -
100
Design and implementation of responsive registration and feedback system using unity3D
Published 2019“…Furthermore, this registration system also provides various additional features like verification, login and gaming. Meanwhile, the feedback function can help on continuous improvement of the project. …”
Get full text
Final Year Project (FYP)