Search alternatives:
"verification" » "modification" (Expand Search)
Showing 101 - 120 results of 218 for search '"verification"', query time: 0.05s Refine Results
  1. 101

    3D object recognition using invariance by Zisserman, A, Forsyth, D, Mundy, J, Rothwell, C, Liu, J, Pillow, N

    Published 1995
    “…These invariant measurements can be used to index a library of object models for recognition and provide a principled basis for the other stages of the recognition process such as feature grouping and hypothesis verification. Object models can be acquired directly from images, allowing efficient construction of model libraries without manual intervention.…”
    Journal article
  2. 102

    Object retrieval with large vocabularies and fast spatial matching by Philbin, J, Chum, O, Isard, M, Sivic, J, Zisserman, A

    Published 2007
    “…To further improve query performance, we add an efficient spatial verification stage to re-rank the results returned from our bag-of-words model and show that this consistently improves search quality, though by less of a margin when the visual vocabulary is large. …”
    Conference item
  3. 103

    An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder by Chen, Ruo Han, Ng, Boon Sim, Paramasivam, Shamala, Ren, Li

    Published 2024
    “…This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
    Article
  4. 104

    A proposed framework of job resources influencing work engagement towards academics of public universities in Beijing and Shanghai in China by Sun, Mengmeng, Kanjanapathy, Malini, Mohamed Saat, Maisarah

    Published 2024
    “…Over the past, work engagement underwent a rigorous verification process in different occupational background. …”
    Get full text
    Article
  5. 105

    Secure and secret cooperation in robotic swarms by Castelló Ferrer, Eduardo, Hardjono, Thomas, Pentland, Alex 'Sandy', Dorigo, Marco

    Published 2021
    “…In other words, data verification can be separated from data itself. We propose a system where robots in a swarm, to cooperate towards mission completion, have to "prove" their integrity to their peers by exchanging cryptographic proofs. …”
    Get full text
    Get full text
    Article
  6. 106

    Secure and secret cooperation in robot swarms by Castelló Ferrer, Eduardo, Hardjono, Thomas, Pentland, Alex, Dorigo, Marco

    Published 2021
    “…In other words, data verification can be separated from data itself. We propose a system where robots in a swarm, to cooperate toward mission completion, have to “prove” their integrity to their peers by exchanging cryptographic proofs. …”
    Get full text
    Article
  7. 107
  8. 108

    Influence of no-core fiber on the focusing performance of an ultra-small gradient-index fiber probe by Bi, Shubo, Wang, Chi, Zhu, Jun, Yuan, Zhiwen, Yu, Yingjie, Valyukh, Sergiy, Asundi, Anand

    Published 2020
    “…By taking the variable relationship between the focusing performance (including the working distance and the focusing spot size) of the probe and the length of the no-core fiber as the criterion, the effective beam expansion length of the no-core fiber in the ultra-small gradient-index fiber probe is calculated based on the basic properties of the Gaussian beam. Verification and analysis are done by numerical calculations and experimental measurements, respectively. …”
    Get full text
    Journal Article
  9. 109

    Electrochemical impedance analysis of thermogalvanic cells by Yang, Peihua, Fan, Hong Jin

    Published 2022
    “…We first propose the detailed impedance model followed experimental verification on three types of electrode materials. Parameters including kinetic rate constants and ion diffusion coefficients for the electrodes are obtained by fitting the impedance data. …”
    Get full text
    Journal Article
  10. 110

    Forgery localization in images by Nur Dilah Binte Zaini

    Published 2023
    “…Due to the increase in popularity for forgeries in images, verification of authenticity in images techniques are required. …”
    Get full text
    Final Year Project (FYP)
  11. 111

    Design and analysis of multiple degree-of-freedom electrical machines with helical motion by He, Yaojie

    Published 2024
    “…Finally, a prototype has been manufactured for verification in practical scenario.…”
    Get full text
    Thesis-Doctor of Philosophy
  12. 112

    Simulation and visualisation of perching manoeuvres by Goo, Yik Wen.

    Published 2011
    “…Visualisation of the manoeuvre provided visual verification of a successful perching manoeuvre, while at the same time allowing the user to see any problems in the manoeuvre that may not be evident from the plotted results.…”
    Get full text
    Final Year Project (FYP)
  13. 113

    Discovery of stabilized functional mutants of human aquaporin 1 by Soh, Miao Yi

    Published 2016
    “…. ~ 5% of mutants from a total of 2816 screened from thirty-three 96-well plates were identified after a series of initial and verification screens. In future, we hope to characterize these mutants for increased stability as they may be useful in structural studies, drug discovery in human cancers related to AQP1 overexpression as well as in biotechnological applications, such as water purification, in particular.…”
    Get full text
    Final Year Project (FYP)
  14. 114

    Automatic program repair and synthesis using genetic programming by Lee, Yue Yu

    Published 2017
    “…When bugs in a program are identified by a debugger or a program verifier, the developer of the program would have to manually interpret the bugs, refine the program, and perform verification for the fix until the program is bug free. …”
    Get full text
    Final Year Project (FYP)
  15. 115

    Identification of alternative-splicing events in human monocyte differentiation by Sim, Donald Yuhui

    Published 2018
    “…The data obtained from RNA-seq still required verification through traditional methods, such as RT-PCR. …”
    Get full text
    Final Year Project (FYP)
  16. 116

    16.358J / 16.863J System Safety, Spring 2005 by Leveson, Nancy

    Published 2005
    “…Topics covered include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. …”
    Get full text
    Learning Object
  17. 117

    Game theoretical security detection strategy for networked systems by Wu, Hao, Wang, Wei, Wen, Changyun, Li, Zhengguo

    Published 2020
    “…Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. …”
    Get full text
    Journal Article
  18. 118

    DDA based grouting prediction and linkage between fracture aperture distribution and grouting characteristics by Xiao, Fei, Shang, Junlong, Zhao, Zhiye

    Published 2021
    “…The observed agreement can be treated as an indirect verification of the robustness of our proposed grouting module. …”
    Get full text
    Journal Article
  19. 119

    Protecting FPGA design with elliptic curve cryptography by Wei, Wei

    Published 2014
    “…This report discusses the complete FPGA design process, including architectural design, scheduling, Verilog coding, simulation and on-board verification.…”
    Get full text
    Final Year Project (FYP)
  20. 120

    Investigation and enhancement of viola jones face detection algorithm performance using contrast-limited adaptive histogram equalization by Mulyadi, Erina

    Published 2015
    “…Face detection is the first and the most important steps to the entire face analysis algorithms, including face alignment, face relighting, face modeling, face recognition, head pose tracking, face verification/authentication, facial expression tracking/recognition, gender or age recognition, and many more. [1] While this sound like a simple task for humans, it is still an extremely challenging task for computers. …”
    Get full text
    Final Year Project (FYP)