-
161
Communication challenges in private finance initiative projects at facilities management stage
Published 2022“…To ensure smooth communication when conveying information during the operational and maintenance, the following item suggested being done by the respondents; verification from the end-user, conducting a technical meeting, following the procedure in executing works, and having a good relationship between both parties. …”
Get full text
Article -
162
Mechanical and microstructural characteristics of high-strength self-compacting concrete (HSSCC) with optimal silica fume and fly ash cement replacement
Published 2024“…These aspects entailed fresh properties’ verification, slump flow, T500, J-ring, segregation resistance, and compressive strength on newly incorporated properties. …”
Get full text
Article -
163
A Verified Compiler for a Functional Tensor Language
Published 2024“…We present a formal correctness proof for an implementation of the compilation algorithm, marking the first verification of a lowering algorithm targeting imperative loop nests from a source functional language that enables separate control of compute and storage ordering. …”
Get full text
Article -
164
CMOS image sensor based physical unclonable function for smart phone security applications
Published 2015“…Existing anti-counterfeiting, authentification and identification methods, which rely on the verification of the IDs stored in the phone memory, are vulnerable to attack. …”
Get full text
Get full text
Get full text
Conference Paper -
165
Efficiency analysis for active rectifier in more electric aircraft (MEA) generator
Published 2021“…Various hardware will be configured to incorporate it into the lab prototype for future experimental verification. The objectives of this project are to investigate the power losses of the semiconductors in various topologies and identify the semiconductor and topology that will bring the maximum efficiency of the rectifier.…”
Get full text
Final Year Project (FYP) -
166
Development of a 3D vehicle driving simulator (cross platform simulation of CAV)
Published 2022“…A significant amount of recent research has been on extending software testing approaches to automated systems with massive quantities of inputs, such as defect identification or model verification of the fundamental decision algorithm. Though this can give some runtime guarantees for the software's resilience, it provides little or no information on how the automated system will function throughout mission execution. …”
Get full text
Final Year Project (FYP) -
167
Load-carrying capacity of ultra-thin shells with and without CNTs reinforcement
Published 2023“…Accordingly, the present formulation can be applied adaptively and naturally to various types of FG-CNTRC structures: plates, shells and membranes. A verification study is conducted to show the high accuracy of the present approach and formulation. …”
Get full text
Journal Article -
168
ASIC implementation of a high speed and low power scalar product computation unit
Published 2009“…This report discusses the entire application-specific integrated circuit implementation process, from RTL coding and functional simulations of the proposed architecture to synthesis and timing verification of the design, and finally the placement and routing of the synthesized design. …”
Get full text
Final Year Project (FYP) -
169
Ground crash area estimation of quadrotor aircraft under propulsion failure
Published 2023“…The experimental data for modeling and simulation verification of multirotor aircraft are limited. So far, crash trajectory prediction has been limited to point mass or ballistic methods, and these methods are usually only suitable for complete power failure and without any control system. …”
Get full text
Journal Article -
170
Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication
Published 2024“…We then provide a formal security proof under the Real-Or-Random (ROR) model and formal security verification by AVISPA. This is followed by a security analysis to show that AKAEC meets the security goals defined for emergency situations. …”
Get full text
Journal Article -
171
Report for project A1017-101on hybrid solar PV thermal (PVT) system using a tracking solar trough I
Published 2011“…With the knowledge gained from the literature review on the possible heat effects on the cell, and understanding that converging heat on the focal area of the trough is and inevitable by-product, the project implemented a cooling system to mitigate this factor. A simple verification study on the effects of heat on the cell output was therefore performed in conjunction with an investigation on the possibility of harnessing of warm water from the output of the cooling system for domestic purposes to maximise the potential of the application. …”
Get full text
Final Year Project (FYP) -
172
-
173
Predictive Modelling and Analysis of Process Parameters on Material Removal Characteristics in Abrasive Belt Grinding Process
Published 2018“…Compared with the experimental results, the model accurately predicts the stock removal. With further verification of the empirical model, a better understanding of the grinding parameters involved in material removal, particularly the influence of the individual process variables and their interaction, can be obtained.…”
Get full text
Get full text
Journal Article -
174
Experimental characterization and modeling of the mechanical properties of Cu–Cu thermocompression bonds for three-dimensional integrated circuits
Published 2012“…The model allows calculation of the true contact area of rough surfaces, based on a creep-dominated plastic deformation. Verification of the model was provided through experiments on Cu–Cuthermocompressionbonds of electroplated Cu on diced silicon wafers with chemically/mechanically polished surfaces. …”
Get full text
Get full text
Journal Article -
175
First-in-man study of the PSMA Minibody IR800-IAB2M for molecularly targeted intraoperative fluorescence guidance during radical prostatectomy
Published 2024“…Histopathological evaluation of intraoperative and postoperative microscopic fluorescence imaging was undertaken for verification. <p><strong> Results</strong></p> Twenty-three patients were evaluated to optimise both the dose of the reagent and the interval between injection and surgery and secure the best possible specificity of fluorescence images. …”
Journal article -
176
Grid integration and coordinated control of voltage source inverters with energy storage systems
Published 2021“…Finally, simulation and experimental results are provided for verification. In addition to the reactive power sharing, the unbalanced power introduced by negative-sequence load currents should also be accurately shared among DESSs based on the power ratings of VSIs. …”
Get full text
Thesis-Doctor of Philosophy -
177
Spoofing detection from a feature representation perspective
Published 2018“…Low-dimensional features that are used in speaker recognition/verification are also used in spoofing detection. Unfortunately, they don't capture sufficient information required for spoofing detection. …”
Get full text
Get full text
Conference Paper -
178
Intellectual property authentication by watermarking scan chain in design-for-testability flow
Published 2010“…The advantage of this scheme is the ownership legitimacy can be publicly authenticated on-site by IP buyers after the chip has been packaged by loading a specific verification code into the scan chain. …”
Get full text
Get full text
Conference Paper -
179
-
180
Blind quantum computing with trapped ions and single photons
Published 2023“…We perform blind computations on linear cluster states and measure error rates surpassing a recently-discovered threshold for secure and robust verification. We quantify the privacy of this system at ⪝0.03 leaked classical bits per qubit in the cluster state. …”
Thesis